CVE-2021-26712
high-risk
Published 2021-02-18
Incorrect access controls in res_srtp.c in Sangoma Asterisk 13.38.1, 16.16.0, 17.9.1, and 18.2.0 and Certified Asterisk 16.8-cert5 allow a remote unauthenticated attacker to prematurely terminate secure calls by replaying SRTP packets.
Do I need to act?
~
3.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (14)
Affected Vendors
References (10)
Third Party Advisory
http://packetstormsecurity.com/files/161473/Asterisk-Project-Security-Advisory-A...
Mailing List
http://seclists.org/fulldisclosure/2021/Feb/59
Vendor Advisory
https://downloads.asterisk.org/pub/security/
Vendor Advisory
https://downloads.asterisk.org/pub/security/AST-2021-003.html
Issue Tracking
https://issues.asterisk.org/jira/browse/ASTERISK-29260
Third Party Advisory
http://packetstormsecurity.com/files/161473/Asterisk-Project-Security-Advisory-A...
Mailing List
http://seclists.org/fulldisclosure/2021/Feb/59
Vendor Advisory
https://downloads.asterisk.org/pub/security/
Vendor Advisory
https://downloads.asterisk.org/pub/security/AST-2021-003.html
Issue Tracking
https://issues.asterisk.org/jira/browse/ASTERISK-29260
51
/ 100
high-risk
Severity
26/34 · High
Exploitability
7/34 · Low
Exposure
18/34 · Moderate