HomeDigiumCVE-2019-18790

CVE-2019-18790

MEDIUM
6.5CVSS
Published: 2019-11-22
Updated: 2024-11-21
AI Analysis

Description

An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer's name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
low
Availability
none
Weaknesses
CWE-862

Metadata

Primary Vendor
DIGIUM
Published
11/22/2019
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

digium : asteriskdigium : asteriskdigium : asteriskdigium : certified_asteriskdigium : certified_asteriskdigium : certified_asteriskdigium : certified_asteriskdigium : certified_asteriskdigium : certified_asteriskdebian : debian_linuxdebian : debian_linux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2019-18790 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com