First published: Fri May 17 2024(Updated: )
Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | <18.23.1 | |
Asterisk | >18.23.0<=18.23.0 | |
Asterisk | >=20.8.1<=20.8.1 | |
Asterisk | >=21.3.1<=21.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35190 is classified as a moderate severity vulnerability due to its potential impact on unauthorized SIP requests.
To address CVE-2024-35190, upgrade Asterisk to version 18.23.1, 20.8.1, or 21.3.1.
CVE-2024-35190 affects Asterisk versions below 18.23.1 and also includes specific instances of versions 20.8.1 and 21.3.1.
CVE-2024-35190 is a vulnerability in the handling of unauthorized SIP requests in Asterisk.
CVE-2024-35190 was reported following the release of Asterisk version 18.23.0, just before the fix in version 18.23.1.