icon

We found results for “

CVE-2025-47780

Good to know:

icon

Date: May 22, 2025

Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, trying to disallow shell commands to be run via the Asterisk command line interface (CLI) by configuring "cli_permissions.conf" (e.g. with the config line "deny=!*") does not work which could lead to a security risk. If an administrator running an Asterisk instance relies on the "cli_permissions.conf" file to work and expects it to deny all attempts to execute shell commands, then this could lead to a security vulnerability. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-78

Top Fix

icon

Upgrade Version

Upgrade to version https://github.com/asterisk/asterisk.git - certified-20.7-cert5;https://github.com/asterisk/asterisk.git - certified-18.9-cert14;https://github.com/asterisk/asterisk.git - 22.4.1;https://github.com/asterisk/asterisk.git - 21.9.1;https://github.com/asterisk/asterisk.git - 20.14.1;https://github.com/asterisk/asterisk.git - 18.26.2

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): LOW

Do you need more information?

Contact Us