First page Back Continue Last page Graphics
Registration (Call) Hijacking
Vulnerability:
- Signaling protocols are unencrypted
Attack:
- Observe a legitimate endpoint registration
- Use observed information and credentials to replace the legitimate registration
- Observe a call-setup message
Effect
- New calls for the endpoint are routed to the malicious device rather than the legitimate device