Vulnerability Note VU#576996

NuPoint Messenger server transmits authentication credentials in plain text

Original Release date: 06 May 2009 | Last revised: 08 May 2009

Overview

NuPoint Messenger is a unified communications product that connects to a Microsoft Exchange server. When communicating with the mail server, the NuPoint Messenger server transmits Exchange usernames and passwords in cleartext.

Description

The NuPoint Messenger server can connect to a Microsoft Exchange server via the IMAP or MAPI protocols. During the authentication process, the NuPoint server will send user domain authentication credentials in cleartext to the Exchange server. Older versions of the NuPoint Messenger product may transmit the NuPoint server's root password without encryption instead of individual usernames and passwords. Administrators are encouraged review the "NuPoint communication with MS Exchange" document for more information.

Impact

An attacker with access to network data may be able to obtain domain (Exchange) usernames and passwords.

Solution

There is no solution to this issue. Administrators are encourgaed to review the below workarounds to mitigate the impact of this vulnerability.

Encrypt connections between NuPoint and Exchange Servers

  • If the MAPI protocol is enabled, connections from the NuPoint server will be encrypted.
  • Using IPSec or some other VPN technology to encrypt the connection between the NuPoint and Exchange server will mitigate this vulnerability.

Restrict access

The NuPoint Messenger server should not use IMAP to connect to remote Exchange servers. If IMAP is enabled, the NuPoint server should be directly connected to the same isolated network as the Exchange server that it is communicating with.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Mitel Networks, Inc.Affected30 Apr 200905 May 2009
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Simon Laurin of Simon Laurin Services-Conseils inc. reported this issue and provided valuable feedback. Mitel provided technical information that was used in this report.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: Unknown
  • Date Public: 04 Dec 2008
  • Date First Published: 06 May 2009
  • Date Last Updated: 08 May 2009
  • Severity Metric: 1.80
  • Document Revision: 25

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.