CVE-2017-14100
critical-risk
Published 2017-09-02
In Asterisk 11.x before 11.25.2, 13.x before 13.17.1, and 14.x before 14.6.1 and Certified Asterisk 11.x before 11.6-cert17 and 13.x before 13.13-cert5, unauthorized command execution is possible. The app_minivm module has an "externnotify" program configuration option that is executed by the MinivmNotify dialplan application. The application uses the caller-id name and number as part of a built string passed to the OS shell for interpretation and execution. Since the caller-id name and number can come from an untrusted source, a crafted caller-id name or number allows an arbitrary shell command injection.
Do I need to act?
!
35.0% chance of exploitation in next 30 days
EPSS score — higher than 65% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (12)
Vendor Advisory
http://downloads.asterisk.org/pub/security/AST-2017-006.html
Third Party Advisory
http://www.securitytracker.com/id/1039252
Issue Tracking
https://bugs.debian.org/873908
Issue Tracking
https://issues.asterisk.org/jira/browse/ASTERISK-27103
Vendor Advisory
http://downloads.asterisk.org/pub/security/AST-2017-006.html
Third Party Advisory
http://www.securitytracker.com/id/1039252
Issue Tracking
https://bugs.debian.org/873908
Issue Tracking
https://issues.asterisk.org/jira/browse/ASTERISK-27103
81
/ 100
critical-risk
Severity
32/34 · Critical
Exploitability
16/34 · Moderate
Exposure
33/34 · Critical