CVE-2025-64328
BaseFortify
Publication date: 2025-11-07
Last updated on: 2026-02-24
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sangoma | firestore | From 17.0.2.36 (inc) to 17.0.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the FreePBX Endpoint Manager module, specifically in the filestore module within the Administrative interface. It affects versions 17.0.2.36 and above before 17.0.3. An authenticated known user can exploit a post-authentication command injection via the testconnection -> check_ssh_connect() function. This allows the attacker to execute commands remotely on the system with the privileges of the 'asterisk' user. The issue is fixed in version 17.0.3.
How can this vulnerability impact me? :
An attacker who successfully exploits this vulnerability can gain remote access to the affected system as the 'asterisk' user. This could lead to unauthorized control over telephony endpoints and potentially further compromise of the system, impacting system integrity and availability.
What immediate steps should I take to mitigate this vulnerability?
Upgrade FreePBX Endpoint Manager to version 17.0.3 or later, as this version contains the fix for the post-authentication command injection vulnerability in the filestore module.