An embedded test key and certificate could be extracted from a Poly Voice device using specialized reverse engineering tools. This extracted certificate could be accepted by a SIP service provider if the service provider does not perform proper validation of the device certificate.
Exploitability
AV:LAC:LAT:NPR:HUI:NVulnerable System
VC:HVI:NVA:NSubsequent System
SC:HSI:HSA:N8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:NOther