CVE-2025-34331
BaseFortify
Publication date: 2025-11-19
Last updated on: 2025-12-12
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| audiocodes | fax_server | to 2.6.23 (inc) |
| audiocodes | interactive_voice_response | to 2.6.23 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in AudioCodes Fax Server and Auto-Attendant IVR appliances up to version 2.6.23. It is an unauthenticated file read vulnerability via the download.php script, which allows remote attackers to download files from the appliance without any authentication. Attackers can specify file paths and names, and although restricted to certain file extensions, they can access sensitive backup archives containing internal databases and credential hashes, potentially exposing administrative password hashes and other sensitive configuration data.
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to unauthorized disclosure of sensitive information such as administrative password hashes and configuration data. This can compromise the security of the affected appliance, potentially allowing attackers to gain further access or control, disrupt services, or use the exposed credentials to attack other systems.