Asterisk Path Traversal vulnerability
CVE-2023-49294

4.9MEDIUM

Key Information:

Vendor

Asterisk

Status
Vendor
CVE Published:
14 December 2023

What is CVE-2023-49294?

Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk prior to versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, it is possible to read any arbitrary file even when the live_dangerously is not enabled. This allows arbitrary files to be read. Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk prior to 18.9-cert6, contain a fix for this issue.

Affected Version(s)

asterisk < 18.20.1 < 18.20.1

asterisk >= 19.0.0, < 20.5.1 < 19.0.0, 20.5.1

asterisk = 21.0.0 = 21.0.0

References

EPSS Score

13% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
4.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.