CVE-2007-6430Improper Authentication in Asterisk

Severity
4.3MEDIUMNVD
EPSS
0.7%
top 28.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 20
Latest updateMay 1

Description

Asterisk Open Source 1.2.x before 1.2.26 and 1.4.x before 1.4.16, and Business Edition B.x.x before B.2.3.6 and C.x.x before C.1.0-beta8, when using database-based registrations ("realtime") and host-based authentication, does not check the IP address when the username is correct and there is no password, which allows remote attackers to bypass authentication using a valid username.

CVSS vector

AV:N/AC:M/C:P/I:N/A:NExploitability: 8.6 | Impact: 2.9

Affected Packages4 packages

Debianasterisk/asterisk_business_edition< 1:1.4.16.2~dfsg-1
NVDasterisk/open_source37 versions+36
debiandebian/asterisk< asterisk 1:1.4.16.2~dfsg-1 (bullseye)

🔴Vulnerability Details

2
GHSA
GHSA-3h3j-j53r-q78w: Asterisk Open Source 12022-05-01
OSV
CVE-2007-6430: Asterisk Open Source 12007-12-20

📋Vendor Advisories

1
Debian
CVE-2007-6430: asterisk - Asterisk Open Source 1.2.x before 1.2.26 and 1.4.x before 1.4.16, and Business E...2007
CVE-2007-6430 — Improper Authentication in Asterisk | cvebase