7.8

CVE-2025-47780

Exploit
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, trying to disallow shell commands to be run via the Asterisk command line interface (CLI) by configuring `cli_permissions.conf` (e.g. with the config line `deny=!*`) does not work which could lead to a security risk. If an administrator running an Asterisk instance relies on the `cli_permissions.conf` file to work and expects it to deny all attempts to execute shell commands, then this could lead to a security vulnerability. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SangomaAsterisk Version < 18.26.2
SangomaAsterisk Version >= 20.0.0 < 20.14.1
SangomaAsterisk Version >= 21.0.0 < 21.9.1
SangomaAsterisk Version >= 22.0.0 < 22.4.1
SangomaCertified Asterisk Version < 18.9
SangomaCertified Asterisk Version18.9 Update-
SangomaCertified Asterisk Version18.9 Updatecert1
SangomaCertified Asterisk Version18.9 Updatecert1-rc1
SangomaCertified Asterisk Version18.9 Updatecert10
SangomaCertified Asterisk Version18.9 Updatecert11
SangomaCertified Asterisk Version18.9 Updatecert12
SangomaCertified Asterisk Version18.9 Updatecert13
SangomaCertified Asterisk Version18.9 Updatecert2
SangomaCertified Asterisk Version18.9 Updatecert3
SangomaCertified Asterisk Version18.9 Updatecert4
SangomaCertified Asterisk Version18.9 Updatecert5
SangomaCertified Asterisk Version18.9 Updatecert6
SangomaCertified Asterisk Version18.9 Updatecert7
SangomaCertified Asterisk Version18.9 Updatecert8
SangomaCertified Asterisk Version18.9 Updatecert8-rc1
SangomaCertified Asterisk Version18.9 Updatecert8-rc2
SangomaCertified Asterisk Version18.9 Updatecert9
SangomaCertified Asterisk Version20.7 Updatecert1
SangomaCertified Asterisk Version20.7 Updatecert1-rc1
SangomaCertified Asterisk Version20.7 Updatecert1-rc2
SangomaCertified Asterisk Version20.7 Updatecert2
SangomaCertified Asterisk Version20.7 Updatecert3
SangomaCertified Asterisk Version20.7 Updatecert4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.09% 0.263
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
security-advisories@github.com 4.8 0 0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.