First published: Tue May 14 2024(Updated: )
Sangoma FreePBX 1805 through 2203 on Linux contains hardcoded credentials for the Asterisk REST Interface (ARI), which allows remote attackers to reconfigure Asterisk and make external and internal calls via HTTP and WebSocket requests sent to the API.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreePBX | >=1805<=2203 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26566 is rated as a high severity vulnerability due to its potential to allow remote attackers to reconfigure Asterisk.
To address CVE-2023-26566, you should update your Sangoma FreePBX version to a patched version released beyond 2203.
CVE-2023-26566 enables attackers to make unauthorized external and internal calls via the Asterisk REST Interface.
CVE-2023-26566 affects Sangoma FreePBX versions from 1805 through 2203.
Yes, hardcoded credentials in CVE-2023-26566 pose significant security risks as they can be exploited by attackers to gain unauthorized access.