Description
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
CVSS Metrics
- Vector
- AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector
- network
- Access Cmplx
- medium
- Auth
- none
- Confidentiality
- complete
- Integrity
- complete
- Availability
- complete
- Weaknesses
- CWE-255
Metadata
- Primary Vendor
- ASTERISK
- Published
- 3/24/2008
- Last Modified
- 4/9/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
asterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asteriskasterisk : asterisk_appliance_developer_kitasterisk : asterisk_appliance_developer_kitasterisk : asterisk_appliance_developer_kitasterisk : asterisk_appliance_developer_kitasterisk : asterisk_appliance_developer_kitasterisk : asterisk_appliance_developer_kitasterisk : asterisk_appliance_developer_kitasterisk : asterisk_appliance_developer_kitasterisk : asterisk_business_editionasterisk : asterisk_business_editionasterisk : asterisknowasterisk : asterisknowasterisk : asterisknowasterisk : asterisknowasterisk : s800iasterisk : s800iasterisk : s800iasterisk : s800iasterisk : s800i
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.