HomeAsteriskCVE-2007-6430

CVE-2007-6430

UNKNOWN
4.3CVSS
Published: 2007-12-20
Updated: 2025-04-09
AI Analysis

Description

Asterisk Open Source 1.2.x before 1.2.26 and 1.4.x before 1.4.16, and Business Edition B.x.x before B.2.3.6 and C.x.x before C.1.0-beta8, when using database-based registrations ("realtime") and host-based authentication, does not check the IP address when the username is correct and there is no password, which allows remote attackers to bypass authentication using a valid username.

CVSS Metrics

Vector
AV:N/AC:M/Au:N/C:P/I:N/A:N
Access Vector
network
Access Cmplx
medium
Auth
none
Confidentiality
partial
Integrity
none
Availability
none
Weaknesses
CWE-287

Metadata

Primary Vendor
ASTERISK
Published
12/20/2007
Last Modified
4/9/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

asterisk : asterisk_business_editionasterisk : asterisk_business_editionasterisk : asterisk_business_editionasterisk : asterisk_business_editionasterisk : asterisk_business_editionasterisk : asterisk_business_editionasterisk : asterisk_business_editionasterisk : asterisk_business_editionasterisk : asterisk_business_editionasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_source

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief