The ShoreTel Mobility Client application for iOS is improperly validating SSL certificates provided by HTTPS connections, leaving the product susceptible to man-in-the-middle attacks, according to an advisory Tuesday by the Software Engineering Institute's CERT Coordination Center (CERT/CC) at Carnegie Mellon University.
Designated CVE-2016-6562, the vulnerability affects versions 220.127.116.11 (the current version as of 3 January) and earlier of the mobility client, which is used to extend enterprise desk phone features and unified communications capabilities such as VoIP, cellular and video calling to iOS devices. The CERT/CC reports that an attacker on the same network as the iOS device “may be able to view or modify network traffic that should have been protected by HTTPS, which may lead to the exposure of sensitive account information, including login credentials.”
There is currently no solution or patch for this issue. However, a separate advisory posted on Info-Sec.CA noted that Sunnyvale, Calif.-based ShoreTel was alerted to the vulnerability on 17 October 2016 and is presently working on an updated version. Security researcher David Coomber is credited with discovering the flaw.