Call Recording Software Used By Police is Deeply Flawed, Advisory Says

Organizations using Nice Recording eXpress should shut it down until it is fully repaired, SEC Consult said

One of many flaws in a call recording tool used by law enforcement could let a hacker remotely steal audio recordings, according to a security consultancy, which recommended companies not use the software until it's fixed.

The software, Nice Recording eXpress, still has at least five vulnerabilities despite the release of some patches earlier this year, according to an advisory from Austria-based SEC Consult, which does security software audits. The software is sold to call centers as well as law enforcement agencies.

Those using Nice Recording eXpress should shut it down, SEC Consult said.

"It is highly recommended by SEC Consult not to use this software until a thorough security review has been performed by security professionals and all identified issues have been resolved," the eight-page advisory read.

If that isn't possible, organizations should at a minimum upgrade to the latest version which is 6.5 PL7, SEC Consult said. The product was also formerly known as Cybertech xPress and Cybertech Myracle, both of which may also be affected. Nice Systems acquired Connecticut-based Cybertech.

Officials at Nice Systems couldn't be immediately reached for comment.

SEC Consult warned Nice Systems it was going public on Wednesday with its findings. The consultancy detailed in the advisory its interaction with Nice Systems since December 2013.

Nice Systems released two patches in March and April resolving five problems, but at least five other critical issues remain.

One of the worst flaws could allow an unauthenticated attacker to gain access to a list of user accounts, including the names of people being monitored. That could be particularly bad for law enforcement, whose surveillance activities are supposed to be secret.

There are also several SQL injection flaws, which could allow hackers full access to a MySQL database of recording, which could allow them to replace recordings with altered ones. Since MySQL runs with the highest-level access rights, a hacker could also mount a separate attack on the computer's operating system, the advisory said.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Insider Resume Makeover: How (and When) to Break the Rules
Recommended
Join the discussion
Be the first to comment on this article. Our Commenting Policies