6.4
CVSSv2

CVE-2022-26499

Published: 15/04/2022 Updated: 02/02/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

An SSRF issue exists in Asterisk up to and including 19.x. When using STIR/SHAKEN, it's possible to send arbitrary requests (such as GET) to interfaces such as localhost by using the Identity header. This is fixed in 16.25.2, 18.11.2, and 19.3.2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

digium asterisk

debian debian linux 10.0

debian debian linux 11.0

Vendor Advisories

Multiple security vulnerabilities have been found in Asterisk, an Open Source Private Branch Exchange Buffer overflows and other programming errors could be exploited for information disclosure or the execution of arbitrary code Special care should be taken when upgrading to this new upstream release Some configuration files and options have cha ...