VoIP vulnerabilities

VoIP vulnerabilities are weaknesses in the VoIP protocol or its implementations that expose users to privacy violations and other problems. VoIP is a group of technologies that enable voice calls online. VoIP contains similar vulnerabilities to those of other internet use.

Risks are not usually mentioned to potential customers.[1] VoIP provides no specific protections against fraud and illicit practices.[citation needed]

Vulnerabilities

Eavesdropping

Unencrypted connections are vulnerable to security breaches. Hackers/trackers can eavesdrop on conversations and extract valuable data.[how?][2][3]

Network attacks

Attacks on the user network or internet provider can disrupt or destroy the connection. Since VoIP requires an internet connection, direct attacks on the internet connection, or provider, can be effective. Such attacks target office telephony. Mobile applications that do not rely on an internet connection to make calls[4] are immune to such attacks.[why?]

Default security settings

VoIP phones are smart devices that need to be configured. In some cases, Chinese manufacturers[citation needed] are using default passwords that lead to vulnerabilities.[5]

VOIP over Wi-Fi

While VoIP is relatively secure[citation needed], it still needs a source of internet, which is often a Wi-Fi network, making VoIP subject to Wi-Fi vulnerabilities[6][further explanation needed]

Packet Loss

Since VoIP runs over an internet connection, via Wired, Wi-Fi or 4G, it is susceptible to packet loss which affects the ability to make and recivie calls or makes the calls hard to hear. The susceptiblity is due to the real time nature of the communication. Packet Loss is the biggest reason for VoIP support calls. [7]

SIP ALG

When VoIP was first setup, a setting called SIP ALG was added to routers to prevent VoIP Packets being modified. However on more modern VoIP systems, the SIP ALG router setting causes routing issues with VoIP Packets causing calls to drop. Routers are usually shipped with SIP ALG turned on. [8]

Exploits

Spam

VoIP is subject to spam[clarification needed] called SPIT (Spam over Internet Telephony). Using the extensions provided by VoIP PBX capabilities, the spammer can harass their target from different numbers.[citation needed] The process can be automated and can fill the target's voice mail with notifications. The spammer can make calls often enough to block the target from getting important calls.[9][irrelevant citation]

Phishing

VoIP users can change their Caller ID if they have admin rights on the VoIP server. Anyone who resells VoIP or manages their own VoIP server can allocate any phone number as an outgoing number. This is commonly used for genuinue reasons when a customer is porting a number, so they can use their number of a new plaform while the port takes place. But it can be used maliciously to mask any number. (a.k.a. Caller ID spoofing)[how?], allowing a caller to pose as a relative or colleague in order to extract information, money or benefits from the target.[10][citation not found]

See also

References

  1. ^ Securing VoIP Networks book by Peter Thermos, Ari Takanen, ISBN 978-0-321-43734-1
  2. ^ Stephen Pritchard (March 28, 2007). "Unencrypted VoIP poses security threat". ITPro.
  3. ^ "Security Advisories ⋆ Asterisk". Asterisk.
  4. ^ "Mobile VOIP alternative for business international calls". www.pindo.me.
  5. ^ "Research: VoIP Phones Can Be Exploited If Not Set Up Properly".
  6. ^ Hickey, Andrew R. (December 18, 2007). "Top 9 VoIP Threats And Vulnerabilities". CRN.
  7. ^ "VoIP and Packet loss issues". /telephonesystems.cloud.
  8. ^ "What is SIP ALG and Why it Causes Problems". /telephonesystems.cloud.
  9. ^ Messmer, Ellen (October 1, 2007). "Top 14 VoIP vulnerabilities". Network World.
  10. ^ "The Vulnerabilities of VoIP".