Exploit chain allows security researchers to compromise Pascom phone systems


Security researchers were able to exploit three unique flaws to completely corrupt Pascom’s Cloud Phone System.

Daniel Eshetu of Ethiopian infosec company Kerbit accomplished full pre-authenticated remote code execution (RCE) on the business-focused Voice over IP (VoIP) and more general communication platform by merging a trio of less significant security weaknesses

Read More…