Description
Incomplete blacklist vulnerability in main/manager.c in Asterisk Open Source 1.8.x before 1.8.15.1 and 10.x before 10.7.1, Certified Asterisk 1.8.11 before 1.8.11-cert6, Asterisk Digiumphones 10.x.x-digiumphones before 10.7.1-digiumphones, and Asterisk Business Edition C.3.x before C.3.7.6 allows remote authenticated users to execute arbitrary commands by leveraging originate privileges and providing an ExternalIVR value in an AMI Originate action.
CVSS Metrics
- Vector
- AV:N/AC:L/Au:S/C:C/I:C/A:C
- Access Vector
- network
- Access Cmplx
- low
- Auth
- single
- Confidentiality
- complete
- Integrity
- complete
- Availability
- complete
- Weaknesses
- NVD-CWE-Other
Metadata
- Primary Vendor
- ASTERISK
- Published
- 8/31/2012
- Last Modified
- 4/11/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
asterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourcesangoma : asteriskasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourceasterisk : open_sourcesangoma : asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : certified_asteriskasterisk : digiumphonesasterisk : business_editionasterisk : business_edition
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.