CompTIA PenTest+ Exam: Validating Possible Findings of VoIP Call Manager CVEs

Validating Possible Findings of VoIP Call Manager CVEs

Question

A penetration tester has identified several newly released CVEs on a VoIP call manager.

The scanning tool the tester used determined the possible presence of the CVEs based off the version number of the service.

Which of the following methods would BEST support validation of the possible findings?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

https://dokumen.pub/hacking-exposed-unified-communications-amp-voip-security-secrets-amp-solutions-2nd-edition-9780071798778-0071798773-

When a penetration tester identifies several newly released CVEs on a VoIP call manager, they need to validate the possible findings to ensure that the vulnerabilities are real and can be exploited. The best method for supporting validation depends on the specific circumstances, but generally, the following four options are the most common:

A. Manually check the version number of the VoIP service against the CVE release: This method involves manually checking the version number of the VoIP service against the CVE release to confirm whether the CVEs are applicable. If the version number is consistent with the CVE release, it is an indicator that the CVEs might be present. However, this method might not provide enough evidence of the existence of the vulnerabilities and could be time-consuming.

B. Test with proof-of-concept code from an exploit database: This method involves testing with proof-of-concept code from an exploit database to determine if the vulnerabilities are exploitable. If the test results in successful exploitation, it confirms the existence of the vulnerabilities. However, this method can be risky since the proof-of-concept code might cause damage to the system or network.

C. Review SIP traffic from an on-path position to look for indicators of compromise: This method involves reviewing SIP traffic from an on-path position to look for indicators of compromise. This method can be helpful since it can detect the exploitation of the CVEs, but it might require additional equipment and technical skills.

D. Utilize an nmap "sV scan against the service": This method involves utilizing an nmap "sV scan against the service" to determine the version of the VoIP service and to identify the associated CVEs. This method is fast and reliable, but it may require permission from the system or network owner.

In conclusion, the best method for supporting validation of the possible findings depends on the specific circumstances, but in most cases, utilizing an nmap "sV scan against the service" can provide fast and reliable results. However, it is essential to obtain permission from the system or network owner before conducting any testing.