Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.
References
Link | Resource |
---|---|
https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d | Patch |
https://github.com/asterisk/asterisk/pull/600 | Issue Tracking Patch |
https://github.com/asterisk/asterisk/pull/602 | Issue Tracking Patch |
https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9 | Exploit Vendor Advisory |
https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d | Patch |
https://github.com/asterisk/asterisk/pull/600 | Issue Tracking Patch |
https://github.com/asterisk/asterisk/pull/602 | Issue Tracking Patch |
https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
26 Aug 2025, 16:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d - Patch | |
References | () https://github.com/asterisk/asterisk/pull/600 - Issue Tracking, Patch | |
References | () https://github.com/asterisk/asterisk/pull/602 - Issue Tracking, Patch | |
References | () https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9 - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:sangoma:asterisk:20.8.0:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:18.23.0:*:*:*:*:*:*:* cpe:2.3:a:sangoma:asterisk:21.3.0:*:*:*:*:*:*:* |
|
First Time |
Sangoma asterisk
Sangoma |
Information
Published : 2024-05-17 17:15
Updated : 2025-08-26 16:19
NVD link : CVE-2024-35190
Mitre link : CVE-2024-35190
CVE.ORG link : CVE-2024-35190
JSON object : View
Products Affected
sangoma
- asterisk