Publications
Withdrawn on August 01, 2018.
PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
Documentation
Topics
Date Published: April 2001
Planning Note (08/01/2018):
Withdrawn: Does not address newer technologies, such as Voice Over IP (VOIP); includes references to “security controls” that pre-date SP 800-53.
Author(s)
Richard Kuhn (NIST)
This report presents a generic methodology for conducting an analysis of a Private Branch Exchange (PBX) in order to identify security vulnerabilities. The report focuses on digital-based PBXs and addresses the following areas for study: System Architecture; Hardware; Maintenance; Administrative Database/Software; and User Features. The methods described in this report are designed to assist administrators in conducting this type of testing. Computer based telephony systems and new techniques such as voice over IP (VOIP) present an entirely new collection of vulnerabilities and are not addressed in this report. However, some of the evaluation methods described here may be applied to these systems as well.
This report presents a generic methodology for conducting an analysis of a Private Branch Exchange (PBX) in order to identify security vulnerabilities. The report focuses on digital-based PBXs and addresses the following areas for study: System Architecture; Hardware; Maintenance; Administrative...
See full abstract
This report presents a generic methodology for conducting an analysis of a Private Branch Exchange (PBX) in order to identify security vulnerabilities. The report focuses on digital-based PBXs and addresses the following areas for study: System Architecture; Hardware; Maintenance; Administrative Database/Software; and User Features. The methods described in this report are designed to assist administrators in conducting this type of testing. Computer based telephony systems and new techniques such as voice over IP (VOIP) present an entirely new collection of vulnerabilities and are not addressed in this report. However, some of the evaluation methods described here may be applied to these systems as well.
Hide full abstract
Keywords
computer security; PBX; private branch exchange; telecommunications security
Control Families
Access Control; Contingency Planning; Identification and Authentication; Maintenance; Media Protection; Physical and Environmental Protection; Risk Assessment