{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T05:38:02.394","vulnerabilities":[{"cve":{"id":"CVE-2024-35190","sourceIdentifier":"security-advisories@github.com","published":"2024-05-17T17:15:07.067","lastModified":"2025-08-26T16:19:01.210","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Asterisk is an open source private branch exchange and telephony toolkit. After upgrade to 18.23.0, ALL unauthorized SIP requests are identified as PJSIP Endpoint of local asterisk server. This vulnerability is fixed in 18.23.1, 20.8.1, and 21.3.1.\n"},{"lang":"es","value":"Asterisk es un conjunto de herramientas de telefonía y centralita privada de código abierto. Después de la actualización a 18.23.0, TODAS las solicitudes SIP no autorizadas se identifican como endpoint PJSIP del servidor asterisk local. Esta vulnerabilidad se solucionó en 18.23.1, 20.8.1 y 21.3.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N","baseScore":5.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-303"},{"lang":"en","value":"CWE-480"},{"lang":"en","value":"CWE-670"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:asterisk:18.23.0:*:*:*:*:*:*:*","matchCriteriaId":"83876F9C-8D22-4562-8C87-06905DFD4321"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:asterisk:20.8.0:*:*:*:*:*:*:*","matchCriteriaId":"75F2AE1C-38EB-45CB-8EC6-373DB3CE8DF2"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:asterisk:21.3.0:*:*:*:*:*:*:*","matchCriteriaId":"A631DF7E-19AB-4DFE-AC5B-2F3F50021ECC"}]}]}],"references":[{"url":"https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/asterisk/asterisk/pull/600","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/asterisk/asterisk/pull/602","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/asterisk/asterisk/commit/85241bd22936cc15760fd1f65d16c98be7aeaf6d","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/asterisk/asterisk/pull/600","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/asterisk/asterisk/pull/602","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-qqxj-v78h-hrf9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}}]}