Search for vulnerabilities
Vulnerability ID | VCID-2sqb-p9p3-aaam |
Aliases |
CVE-2024-42365
|
Summary | asterisk: From NVD collector |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 7.9 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
Data source | Metasploit |
---|---|
Description | On Asterisk, prior to versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with 'write=originate' may change all configuration files in the '/etc/asterisk/' directory. Writing a new extension can be created which performs a system command to achieve RCE as the asterisk service user (typically asterisk). Default parking lot in FreePBX is called "Default lot" on the website interface, however its actually 'parkedcalls'. Tested against Asterisk 19.8.0 and 18.16.0 on Freepbx SNG7-PBX16-64bit-2302-1. |
Note | Stability: - crash-safe SideEffects: - ioc-in-logs - config-changes Reliability: - repeatable-session |
Ransomware campaign use | Unknown |
Source publication date | Aug. 8, 2024 |
Platform | Unix |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/linux/misc/asterisk_ami_originate_auth_rce.rb |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.59415 |
EPSS Score | 0.00211 |
Published At | Nov. 1, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2024-08-09T07:27:21.227539+00:00 | RedHat Importer | Import | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-42365.json | 34.0.0rc4 |