SB2025052604 - Multiple vulnerabilities in Asterisk
Published: May 26, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Protection mechanism failure (CVE-ID: CVE-2025-47780)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to permissions to deny command execution via the "cli_permissions.conf" file do not work as expected. A local user with access to Asterisk CLI can still execute arbitrary OS commands even if the current configuration disallows it.
2) Input validation error (CVE-ID: CVE-2025-47779)
The vulnerability allows a remote user to perform spoofing attack.
The vulnerability exists due to insufficient validation of MESSAGE SIP requests when handling the From header with a semicolon or NULL in the name portion. A remote authenticated user can spoof any user identity to send spam messages to the application users.
Remediation
Install update from vendor's website.