An issue was discovered in manager.c in Sangoma Asterisk through 13.x, 16.x, 17.x and Certified Asterisk 13.21 through 13.21-cert4. A remote authenticated Asterisk Manager Interface (AMI) user without system authorization could use a specially crafted Originate AMI request to execute arbitrary system commands.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
11
Affected Products
8
References
digium / asterisk
| - |
| digium | certified_asterisk | - | - |
| digium | certified_asterisk | - | - |
| digium | certified_asterisk | - | - |
| digium | certified_asterisk | - | - |
| digium | certified_asterisk | - | - |
| digium | certified_asterisk | - | - |
| debian | debian_linux | - | - |
| debian | debian_linux | - | - |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact