CVE-2026-23741Uncontrolled Search Path Element in Asterisk

Severity
8.8HIGHNVD
EPSS
0.0%
top 87.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 6

Description

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the asterisk/contrib/scripts/ast_coredumper runs as root, as noted by the NOTES tag on line 689 of the ast_coredumper file. The script will source the contents of /etc/asterisk/ast_debug_tools.conf, which resides in a folder that is writeable by the asterisk user:group. Due to the /etc/asterisk/ast_debug_tools.conf file following bash semantics and it bein

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

debiandebian/asterisk< asterisk 1:16.28.0~dfsg-0+deb11u9 (bullseye)
NVDsangoma/asterisk21.0.021.12.1+3
CVEListV5asterisk/asterisk< 23.2.2+4
Debianasterisk/asterisk< 1:16.28.0~dfsg-0+deb11u9

🔴Vulnerability Details

1
OSV
CVE-2026-23741: Asterisk is an open source private branch exchange and telephony toolkit2026-02-06

📋Vendor Advisories

1
Debian
CVE-2026-23741: asterisk - Asterisk is an open source private branch exchange and telephony toolkit. Prior ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23741 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23741 — Uncontrolled Search Path Element | cvebase