801
VMScore

CVE-2019-18610

Published: 22/11/2019 Updated: 03/06/2022
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

An issue exists in manager.c in Sangoma Asterisk up to and including 13.x, 16.x, 17.x and Certified Asterisk 13.21 up to and including 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

digium certified asterisk 13.21.0

digium asterisk

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #947377 asterisk: CVE-2019-18610: AST-2019-007: AMI user could execute system commands Package: src:asterisk; Maintainer for src:asterisk is Debian VoIP Team <pkg-voip-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 25 Dec 2019 21:51:02 UT ...