The public statement from Avaya.
TO: AVAYA SALES, PARTNERS, AND CUSTOMERS
REGARDING: RECENT NEWS ARTICLES ABOUT AVAYA H.323 PHONE VUNERABILITY
You may have seen or received questions about a security issue with certain Avaya desktop phones due to recent news articles.
This concern is regarding a 10 year old bug that re-surfaced on certain Avaya desktop and conferencing phones.
Please be aware that:
- This issue only affects 9608, 9608G, 9611G, 9621G, 9641G, 9641GS, B189, J169, and J179 devices using H.323 signaling. Those same devices using SIP signaling are unaffected.
- This issue has already been addressed in the June 25th release of software (version 6.8.2) for these devices.
IF you would like to better understand this or to be better able to address any questions you may receive, please review the Avaya Security Advisory (ASA) ASA-2019-128 issued on July 18, 2019 that can be found at this link (
You may also provide this link to anyone else that is interested in this matter.
This ASA contains a link to Avaya’s Product Vulnerability Response Policy (
that provides more details on the formal structure that Avaya uses to monitor, assess, and notify stakeholders of potential security issues.
In addition, any inquiries can be best responded to with the following statement:
“Avaya has a clear and well-defined policy that requires our products to use the most recent software release to make sure security issues are addressed in a timely manner.
With respect to the security issue identified in ISC DHCP, Avaya issued a security advisory (
on July 18, 2019 that addresses and resolves the identified risk. Avaya thanked Philippe Laulheret for his responsible disclosure and cooperation with Avaya during the handling of this matter.
Customers should always make sure that physical access to communications devices are limited to approved personnel to prevent physical tampering with these devices by unauthorized entities.”
THANK YOU!
No I don't write all the manuals. No I don't code the software. No I don't design the phones.