CVE-2025-34329
BaseFortify
Publication date: 2025-11-19
Last updated on: 2025-12-12
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| audiocodes | fax_server | to 2.6.23 (inc) |
| audiocodes | interactive_voice_response | to 2.6.23 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in AudioCodes Fax Server and Auto-Attendant IVR appliances up to version 2.6.23. It involves an unauthenticated backup upload endpoint that allows an attacker to upload files without any authentication, authorization, or file-type validation. The uploaded files can be placed in a backup directory that, on default Windows deployments, resolves to the system drive. This enables an attacker to upload malicious files that can be executed by the web server, leading to arbitrary command execution with SYSTEM-level privileges.
How can this vulnerability impact me? :
An attacker can exploit this vulnerability to execute arbitrary commands on the affected system with the highest privileges (NT AUTHORITY\SYSTEM). This can lead to full system compromise, unauthorized access to sensitive data, disruption of services, and potential further attacks within the network.