Sangoma Certified Asterisk vulnerabilities

15 known vulnerabilities affecting sangoma/certified_asterisk.

Total CVEs
15
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
HIGH5MEDIUM10

Vulnerabilities

Page 1 of 1
CVE-2026-23740HIGHCVSS 7.8v13.13.0v16.8+3 more2026-02-06
CVE-2026-23740 [HIGH] CWE-427 CVE-2026-23740: Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cer Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, when ast_coredumper writes its gdb init and output files to a directory that is world-writable (for example /tmp), an attacker with write permission(which is all users on a linux system) to that directory can ca
nvd
CVE-2026-23741HIGHCVSS 8.8≤ 18.9v20.72026-02-06
CVE-2026-23741 [HIGH] CWE-427 CVE-2026-23741: Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cer Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the asterisk/contrib/scripts/ast_coredumper runs as root, as noted by the NOTES tag on line 689 of the ast_coredumper file. The script will source the contents of /etc/asterisk/ast_debug_tools.conf, which reside
nvd
CVE-2026-23738MEDIUMCVSS 6.1≤ 18.9v20.72026-02-06
CVE-2026-23738 [MEDIUM] CWE-79 CVE-2026-23738: Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cer Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, user supplied/control values for Cookies and any GET variable query Parameter are directly interpolated into the HTML of the page using ast_str_append. The endpoint at GET /httpstatus is the potential vulnerabl
nvd
CVE-2026-23739MEDIUMCVSS 6.5≤ 18.9v20.72026-02-06
CVE-2026-23739 [MEDIUM] CWE-611 CVE-2026-23739: Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cer Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the ast_xml_open() function in xml.c parses XML documents using libxml with unsafe parsing options that enable entity expansion and XInclude processing. Specifically, it invokes xmlReadFile() with the XML_PARS
nvd
CVE-2025-1131HIGHCVSS 7.0v18.9v20.72025-09-23
CVE-2025-1131 [HIGH] CWE-427 CVE-2025-1131: A local privilege escalation vulnerability exists in the safe_asterisk script included with the Aste A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitima
nvd
CVE-2025-54995MEDIUMCVSS 6.5fixed in 18.9v18.92025-08-28
CVE-2025-54995 [MEDIUM] CWE-400 CVE-2025-54995: Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 18.26.4 Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 18.26.4 and 18.9-cert17, RTP UDP ports and internal resources can leak due to a lack of session termination. This could result in leaks and resource exhaustion. This issue has been patched in versions 18.26.4 and 18.9-cert17.
nvd
CVE-2025-49832MEDIUMCVSS 6.5≤ 18.9v20.72025-08-01
CVE-2025-49832 [MEDIUM] CWE-476 CVE-2025-49832: Asterisk is an open source private branch exchange and telephony toolkit. In versions up to and incl Asterisk is an open source private branch exchange and telephony toolkit. In versions up to and including 18.26.2, between 20.00.0 and 20.15.0, 20.7-cert6, 21.00.0, 22.00.0 through 22.5.0, there is a remote DoS and possible RCE condition in `asterisk/res/res_stir_shaken /verification.c` that can be exploited when an attacker can set an arbitrary Ide
nvd
CVE-2025-47779MEDIUMCVSS 6.5fixed in 18.9v18.9+1 more2025-05-22
CVE-2025-47779 [MEDIUM] CWE-140 CVE-2025-47779: Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1 Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, SIP requests of the type MESSAGE (RFC 3428) authentication do not get proper alignment. An authenticated attacker can spoof any user identity to send spam messages
nvd
CVE-2025-47780MEDIUMCVSS 4.8fixed in 18.9v18.9+1 more2025-05-22
CVE-2025-47780 [MEDIUM] CWE-78 CVE-2025-47780: Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1 Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, trying to disallow shell commands to be run via the Asterisk command line interface (CLI) by configuring `cli_permissions.conf` (e.g. with the config line `deny=!*`
nvd
CVE-2024-42491MEDIUMCVSS 5.7fixed in 18.9v18.9+1 more2024-09-05
CVE-2024-42491 [MEDIUM] CWE-252 CVE-2024-42491: Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21. Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.24.3, 20.9.3, and 21.4.3 of Asterisk and versions 18.9-cert12 and 20.7-cert2 of certified-asterisk, if Asterisk attempts to send a SIP request to a URI whose host portion starts with `.1` or `[.1]`, and res_resolver_unbound is loaded, Asterisk will crash with a SEGV. To r
nvd
CVE-2023-49294HIGHCVSS 7.5PoCv13.13.0v16.8.0+1 more2023-12-14
CVE-2023-49294 [HIGH] CWE-22 CVE-2023-49294: Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versi Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the `live_dangerously` is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and
nvd
CVE-2023-37457HIGHCVSS 8.2v13.13.0v16.8.0+1 more2023-12-14
CVE-2023-37457 [HIGH] CWE-120 CVE-2023-37457: Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20 Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk versions 18.20.0 and prior, 20.5.0 and prior, and 21.0.0; as well as ceritifed-asterisk 18.9-cert5 and prior, the 'update' functionality of the PJSIP_HEADER dialplan function can exceed the available buffer space for storing the new value of a header. By doing so thi
nvd
CVE-2023-49786MEDIUMCVSS 5.9v13.13.0v16.8.0+1 more2023-12-14
CVE-2023-49786 [MEDIUM] CWE-703 CVE-2023-49786: Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versi Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1; as well as certified-asterisk prior to 18.9-cert6; Asterisk is susceptible to a DoS due to a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup. This attack can be
nvd
CVE-2022-42705MEDIUMCVSS 6.5v18.92022-12-05
CVE-2022-42705 [MEDIUM] CWE-416 CVE-2022-42705: A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-ce A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription.
nvd
CVE-2022-42706MEDIUMCVSS 4.9fixed in 18.9v18.92022-12-05
CVE-2022-42706 [MEDIUM] CWE-22 CVE-2022-42706: An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal.
nvd