Cal Leeming discusses vulnerabilities in the auto provisioning systems of several VoIP phone vendors, including Yealink and Snom. He describes how remote attackers could potentially extract user credentials and provisioning information from devices without authentication by scanning the MAC address ranges and exploiting insecure auto provisioning servers. Leeming urges vendors to implement encryption of configuration files and other protections by default to prevent such attacks. He also provides recommendations for immediate protections providers can take and encourages the community to help test devices and provisioning systems to identify vulnerabilities.