CVE-2026-23740Uncontrolled Search Path Element in Asterisk

Severity
7.8HIGHNVD
EPSS
0.0%
top 96.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 6

Description

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, when ast_coredumper writes its gdb init and output files to a directory that is world-writable (for example /tmp), an attacker with write permission(which is all users on a linux system) to that directory can cause root to execute arbitrary commands or overwrite arbitrary files by controlling the gdb init file and output paths. This issue has been patched

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

debiandebian/asterisk< asterisk 1:16.28.0~dfsg-0+deb11u9 (bullseye)
NVDsangoma/asterisk21.0.021.12.1+3
CVEListV5asterisk/asterisk< 23.2.2+4
Debianasterisk/asterisk< 1:16.28.0~dfsg-0+deb11u9
NVDsangoma/certified_asterisk5 versions+4

🔴Vulnerability Details

1
OSV
CVE-2026-23740: Asterisk is an open source private branch exchange and telephony toolkit2026-02-06

📋Vendor Advisories

2
Red Hat
Asterisk: Asterisk: Arbitrary code execution and file overwrite as root via insecure ast_coredumper file handling2026-02-06
Debian
CVE-2026-23740: asterisk - Asterisk is an open source private branch exchange and telephony toolkit. Prior ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23740 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23740 — Uncontrolled Search Path Element | cvebase