Accessibility Skip to content

As of August 29, 2022, HP Inc. completed the acquisition of Poly. For HP product support, please visit the HP Customer Support site.

Poly Systems - Spectre and Meltdown

Vulnerability Summary

On January 3, 2018, researchers disclosed information on three vulnerabilities identified in some microprocessors that could allow an attacker to exploit processor speculation or take advantage of cache timing side-channels. Under specific circumstances, these vulnerabilities could potentially allow unprivileged local attacker to read privileged data contained in secure areas of system memory belonging to other processes or system kernel.

There were three original variants of the issue:

  • Variant 1: CVE-2017-5753 - speculative execution bounds-check bypass
  • Variant 2: CVE-2017-5715 - speculative execution branch target injection
  • Variant 3: CVE-2017-5754 - speculative execution permission faults handling


On May 2nd, 2018, two new variants of the Spectre and Meltdown vulnerabilities were published.
Similar to the original three, the new variants are:

  • Variant 3a: CVE-2018-3640 – speculative execution rogue system register read
  • Variant 4: CVE-2018-3639 – speculative execution store bypass  
Published

Last Update: 3/14/2022
Initial Public Release: 7/12/2018
Advisory ID:  PLYGN18-01

CVE ID: CVE-2017-5753
CVSS Score: 5.6
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

 

CVE ID: CVE-2017-5715
CVSS Score: 5.6
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

 

CVE ID: CVE-2017-5754
CVSS Score: 5.6
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

 

CVE ID: CVE-2018-3640
CVSS Score: 5.6
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

 

CVE ID: CVE-2018-3639
CVSS Score: 5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Vulnerable CPUs vs. Vulnerable Appliances
From our investigation, Poly has determined that while many of our products use CPUs that are technically vulnerable to the Spectre and Meltdown, none are susceptible due to the way their software is written and the way the appliance is used. In order for Spectre or Meltdown to be effective exploits, the appliance would need to have malicious code installed onto it or be used to browse to a website that pushes malicious code via a web browser. Poly appliances do not allow for applications to be installed onto them so this vector can’t be exploited. For the few products that do contain a web browser, the required software libraries are not present that would allow for malicious code to be pushed onto them and executed. There have been no reports of Poly appliance in the field exploited by Spectre or Meltdown.

Virtual Editions
Poly’s virtual editions of our appliances are not vulnerable to Spectre or Meltdown. The vectors needed for the vulnerability to work on these products are not present. Spectre and Meltdown require malicious software to be installed on the product which our appliances do not allow, or the product needs to browse to a website that is pushing malicious code and our appliances do not have browsers or the software libraries needed to install the malicious software. Based on this, Poly does not believe that our appliances are vulnerable to either Spectre or Meltdown. Poly will be performing additional updates to our appliances and virtual editions in the coming months to help prevent this type of exploit in the future.

Please Note - it is possible that the virtual host machine (e.g. VMWare or Hyper-V) is vulnerable and needs patches that are available from the vendor.

Group Series Family (Group Series, Centro, Medialign)
The Poly Group Series does not perform any actions that would make it vulnerable to Spectre or Meltdown. It does not allow for software applications to be installed on it nor does it allow for any web browsing. File uploads to the appliance are limited to digitally signed software images from Poly and JPEG images.

VVX and Trio Families of Phones
The Poly VVX and Trio families of phones are not susceptible to Spectre or Meltdown. They do not allow software to be installed on them which would prohibit malicious code from being loaded and they are lacking the software libraries needed for malicious software to be pushed from the web. None of the vectors needed for Spectre or Meltdown are present in any of these phones.

Other Poly Appliances
Poly is performing a close review of all our supported products to determine if there is any risk and will continue to update them as needed. Many of our infrastructure products using Intel processors have received updates even though the appliance itself isn’t vulnerable.

 

Details

CVE 2017-5753 - speculative execution bounds-check bypass
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVE 2017-5715 - speculative execution branch target injection
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVE 2017-5754 - speculative execution permission faults handling
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.

CVE 2018-3640 – speculative execution rogue system register read
Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.

CVE 2018-3639 – speculative execution store bypass
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

Product Affected
PRODUCTS STATUS
Centro Not Vulnerable
Content Connect Not Vulnerable
CX 600 and CX 3000 Not Vulnerable
CX Phones (CX5100, CX5500) Not Vulnerable
Debut Not Vulnerable
DMA Not Vulnerable
Group Series Not Vulnerable
HDX  Not Vulnerable
ISDN Gateway Not Vulnerable
Medialign  Not Vulnerable
Pano Not Vulnerable
Poly Cloud Service Not Vulnerable
Poly Touch Control Not Vulnerable
RealAccess Cloud Service

Not Vulnerable

RealConnect for O365 Not Vulnerable
RealPresence Access Director Not Vulnerable
RealPresence Collaboration Server / RMX Not Vulnerable
RealPresence Desktop and Mobile (RPD /RPM)

Not Vulnerable

 
PRODUCTS STATUS
RealPresence MediaSuite Not Vulnerable
RealPresence Resource Manager Not Vulnerable
RealPresence Touch Not Vulnerable
RealPresence WebSuite Not Vulnerable
SoundPoint Not Vulnerable
SoundPoint IP Not Vulnerable
SoundStation Not Vulnerable
SoundStation 2W Not Vulnerable
SoundStation IP Not Vulnerable
SoundStructure Not Vulnerable
Trio (8800, 8500) Not Vulnerable
Trio Visual+ Not Vulnerable
VBP Not Vulnerable
Virtual Editions of Poly Appliances

Not Vulnerable

VoiceStation/VTX Not Vulnerable
VoiceStation/VTX Not Vulnerable
VoxBox Not Vulnerable
VVX Business Media Phones (All Models)

Not Vulnerable

Solution

No action is necessary. 

 

Workaround

Many modern CPUs use speculative execution and are potentially susceptible to these types of attacks.  However, it is important to note an attacker must be able to execute malicious code on a vulnerable device to exploit one of these vulnerabilities and gain access to restricted memory.  The impact of these vulnerabilities is greatest on multi-user systems – shared hosting, cloud services, virtual machines, etc. – where unprivileged access to the system resources is generally available.

Poly products are designed and deployed in a manner that largely mitigate such classes of vulnerability, are not multi-user systems, and do not typically allow access to the operating system for normal operation nor do they allow the installation of custom code and the ability to load or execute code is limited to privilege users and firmware signature validation blocks the installation of firmware not signed by Poly. Some Poly infrastructure products do by default provide unprivileged OS-level service accounts for configuration and maintenance. On these systems, we recommend changing default passwords, restricting account access to trusted administrators, and disabling shell access.

Customer Mitigations:

  • Limit access to critical infrastructure equipment to only trusted administrators from trusted administrative networks or hosts.
  • Ensure that all default passwords have been changed.

 

Poly will be developing software fixes for supported products found to be vulnerable to prevent these types of attacks. This advisory will be updated as patches are made available.  

Contact

Any customer using an affected system who is concerned about this vulnerability within their deployment should contact Poly Technical Support(888) 248-4143, (916) 928-7561, or visit the Poly Support Site.

 

Revision History
VERSION DATE DESCRIPTION
1.0 1/4/2018 Initial Release
1.1 1/4/2018 Updated Summary, Impact and Risk, Mitigations and Notes details
1.2 1/4/2018 Updated product list
1.3 1/4/2018 Updated status on several products and revised CVSS score
1.4 1/4/2018 Updated product status, updated Vulnerability Summary and Mitigations
1.5 1/4/2018 Updated product status
1.6 1/4/2018 Updated product table for Patch release dates and added notes
1.7 1/4/2018 Updated product table for CX phones
1.8 1/4/2018 Updated product table for all products
1.9 1/4/2018 Updated advisory to include variants 3a and 4
2.0 3/14/2022 Format Changes

©2022 Plantronics, Inc. All rights reserved.

Trademarks
Poly, the propeller design, and the Poly logo are trademarks of Plantronics, Inc.  All other trademarks are property of their respective owners. No portion hereof may be reproduced or transmitted in any form or by any means, for any purpose other than the recipient's personal use, without the express written permission of Poly.

Disclaimer
While Poly uses reasonable efforts to include accurate and up-to-date information in this document, Poly makes no warranties or representations as to its accuracy. Poly assumes no liability or responsibility for any typographical errors, out of date information, or any errors or omissions in the content of this document. Poly reserves the right to change or update this document at any time. Individuals are solely responsible for verifying that they have and are using the most recent Technical Bulletin. 

Limitation of Liability
Poly and/or its respective suppliers make no representations about the suitability of the information contained in this document for any purpose. Information is provided "as is" without warranty of any kind and is subject to change without notice. The entire risk arising out of its use remains with the recipient. In no event shall Poly and/or its respective suppliers be liable for any direct, consequential, incidental, special, punitive, or other damages whatsoever (including without limitation, damages for loss of business profits, business interruption, or loss of business information), even if Poly has been advised of the possibility of such damages.