The Samsung SMT-i series is End-of-Sale on the 30th of September 2019 (source). However, software development ceased much earlier. For example, the built-in OpenSSL version is 1.0.1r from January 2016, although the last firmware has a timestamp from December 2017. These phones can be used with:
The latter two are based on SIP. Therefore, you have to convert your phone from OS to SCM… The default password for the phone interface is 1234. The phone interface allows for configuration: (hardware button) Options → Phone → Version → *153# (blind entry) → Easy Install → Mode: Standard. The Web interface called Deskphone Manager is reachable via HTTP (port 8080) or HTTPs (port 443). I had to use a combination of both because the phone interface did not take my SIP password, and the Web interface did not take my SIP host.
01.62 → SCMx IP phone Software
Password: | admin/samsung*# and user/samsung Phone Management → Password |
HTTPS: | enabled on default |
Update: | Phone Management → S/W Upgrade |
Trust Anchors: | Phone Management → Certificate Management broken; gives me: No upload directory |
SIP-URI User: | Network → Provisioning → Mode: Standard Network → Provisioning → Line Number |
SIP-URI Host: | Network → Provisioning → Address Advanced → Server: Registrar → Registrar Server1 → Port: 0 (enables DNS-SRV) |
SIP-over-TLS: | Network → Provisioning → Protocol: TLS broken because the phone requires a trust anchor |
SDES-sRTP: | Network → Provisioning → (Registrar) Data: SRTP which is RTP/SAVP |
SHA-2 Digest: | does not pick MD5, continues without header Authorization, therefore is not able to register; therefore incompatible with Linphone |
DNS-NAPTR: | missing |
Call Reject (UDUB): | sends status 603; found no way to send status 486 |
Audio: | AMR-WB octet-aligned mode but not signaled in SDP Mitigation: Web → Phone → Media → (Voice Codec Priority) 2: Not use |
Named Curves: | offers not P-256 (NID_X9_62_prime256v1) but only P-224 (NID_secp224r1) Because OpenSSL does not accept that on default, this disables all Cipher Suites based on ECDHE. Mitigation: patch your server SSL_CTX_set1_groups_list(, "X25519:P-256:P-224:X448:P-384:P-521"); Digium Asterisk 13 LTS: example |
DiffServ: | not enabled on default Mitigation: Web → Advanced → SIP Option → QoS → Type: DSCP → Signal: 40 → Media: 46 |
Bugs: | missing TLS_ECDHE_[RSA|ECDSA]_WITH_AES_128_GCM_SHA256, Cipher Suites include RC4 and Single-DES (OpenSSL 1.0.1r; version displayed in phone menu) |
Responsible Disclosure: | via E-mail (difficult to get) |
Firmware Update: | missing Automation missing Newsletter |
12 V 2.0 A Coaxial: unknown