First published: Mon Dec 02 2024(Updated: )
An issue in the action_listcategories() function of Sangoma Asterisk v22/22.0.0/22.0.0-rc1/22.0.0-rc2/22.0.0-pre1 allows attackers to execute a path traversal.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Asterisk | >=22.0.0-rc1<=22.0.0-rc2>22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53566 is rated as a critical severity vulnerability due to its potential for path traversal attacks.
To fix CVE-2024-53566, update Sangoma Asterisk to a version beyond 22.0.0-rc2.
CVE-2024-53566 affects Sangoma Asterisk versions 22.0.0-rc1, 22.0.0-rc2, and 22.0.0-pre1.
CVE-2024-53566 allows attackers to exploit a path traversal vulnerability, potentially giving unauthorized access to system files.
Currently, there are no documented workarounds for CVE-2024-53566, and upgrading is the recommended action.