Search for vulnerabilities
Vulnerability details: VCID-mq5t-mm81-xkhx
Vulnerability ID VCID-mq5t-mm81-xkhx
Aliases CVE-2024-53566
Summary An issue in the action_listcategories() function of Sangoma Asterisk v22/22.0.0/22.0.0-rc1/22.0.0-rc2/22.0.0-pre1 allows attackers to execute a path traversal.
Status Published
Exploitability 0.5
Weighted Severity 5.0
Risk 2.5
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00026 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 7e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 8e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 8e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 8e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 8e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 8e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 8e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 8e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 8e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
epss 9e-05 https://api.first.org/data/v1/epss?cve=CVE-2024-53566
cvssv3.1 5.5 https://gist.github.com/hyp164D1/e7c0f44ffb38c00320aa1a6d98bee616
ssvc Track https://gist.github.com/hyp164D1/e7c0f44ffb38c00320aa1a6d98bee616
cvssv3.1 5.5 https://github.com/asterisk/asterisk/blob/22/main/manager.c#L2556
ssvc Track https://github.com/asterisk/asterisk/blob/22/main/manager.c#L2556
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://gist.github.com/hyp164D1/e7c0f44ffb38c00320aa1a6d98bee616
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:37:51Z/ Found at https://gist.github.com/hyp164D1/e7c0f44ffb38c00320aa1a6d98bee616
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/asterisk/asterisk/blob/22/main/manager.c#L2556
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:37:51Z/ Found at https://github.com/asterisk/asterisk/blob/22/main/manager.c#L2556
Exploit Prediction Scoring System (EPSS)
Percentile 0.03442
EPSS Score 0.00022
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2024-12-06T07:04:56.597300+00:00 EPSS Importer Import https://epss.cyentia.com/epss_scores-current.csv.gz 35.0.0