Privilege escalation in Asterisk



Published: 2024-08-12
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-42365
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Certified Asterisk
Server applications / Conferencing, Collaboration and VoIP solutions

Asterisk Open Source
Server applications / Conferencing, Collaboration and VoIP solutions

Vendor Digium (Linux Support Services)

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU95788

Risk: Medium

CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-42365

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to improper access restrictions for users with "write=originate" role. A remote user can alter all configuration files in the `/etc/asterisk/` directory and use a set of built-in features, such as Set+File, Set+Curl, Reload+manager, Reload+pbx_config to overwrite files and escalate privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Certified Asterisk: 18.9-cert1 - 20.7-cert1

Asterisk Open Source: 18.0.0 rc1 - 21.4.1

External links

http://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44
http://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4
http://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8
http://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71
http://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993
http://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2
http://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426
http://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###