SIP Authentication Vulnerability in Asterisk Telephony Toolkit
CVE-2025-57767

7.5HIGH

Key Information:

Vendor

Asterisk

Status
Vendor
CVE Published:
28 August 2025

What is CVE-2025-57767?

The Asterisk Telephony Toolkit, prior to versions 20.15.2, 21.10.2, and 22.5.2, contains an authentication vulnerability where improper handling of SIP requests could lead to a segmentation fault. Specifically, if a SIP request includes an Authorization header with an unrecognized realm or an invalid realm without prior proper authentication responses, the get_authorization_header() function fails to validate the integrity of the header, potentially disrupting service. It is crucial for users to upgrade to the patched versions to mitigate these risks, as there are no known workarounds for this issue.

Affected Version(s)

asterisk < 22.5.2 < 22.5.2

asterisk < 21.10.2 < 21.10.2

asterisk < 20.15.2 < 20.15.2

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-57767 : SIP Authentication Vulnerability in Asterisk Telephony Toolkit