Asterisk AMI Vulnerability Enables Remote Code Execution
/ 1 min read
Asterisk AMI Vulnerability Allows Remote Code Execution. A critical vulnerability has been identified in Asterisk versions prior to 18.24.2, 20.9.2, and 21.4.2, which allows authenticated users with ‘write=originate’ permissions to modify configuration files in the ‘/etc/asterisk/’ directory. This flaw can be exploited to create a backdoor that executes system commands as the Asterisk service user. The vulnerability has been tested against Asterisk versions 19.8.0 and 18.16.0 on FreePBX. Users are advised to update their systems to the latest versions to mitigate the risk of exploitation. The issue has been documented under CVE-2024-42365, and further details can be found in the advisory linked above.