HomeSangomaCVE-2025-1131

CVE-2025-1131

HIGH
7.0CVSS
Published: 2025-09-23
Updated: 2025-11-03
AI Analysis

Description

A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.

CVSS Metrics

Vector
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:C/RE:H/U:Amber
Attack Vector
local
Complexity
low
Privileges
low
User Action
passive
Confidentiality
undefined
Integrity
undefined
Availability
undefined
Weaknesses
CWE-427

Metadata

Primary Vendor
SANGOMA
Published
9/23/2025
Last Modified
11/3/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

sangoma : asterisksangoma : asterisksangoma : asterisksangoma : asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisksangoma : certified_asterisk

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-1131 | HIGH Severity | CVEDatabase.com | CVEDatabase.com