{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-15T19:52:39.701","vulnerabilities":[{"cve":{"id":"CVE-2024-42365","sourceIdentifier":"security-advisories@github.com","published":"2024-08-08T17:15:19.340","lastModified":"2025-11-03T22:18:05.417","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue."},{"lang":"es","value":"Asterisk es un kit de herramientas de telefonía y centralita privada (PBX) de código abierto. Antes de las versiones de asterisk 18.24.2, 20.9.2 y 21.4.2 y de las versiones de asterisco certificado 18.9-cert11 y 20.7-cert2, un usuario de AMI con `write=originate` podía cambiar todos los archivos de configuración en `/etc/asterisk. /` directorio. Esto ocurre porque pueden curvar archivos remotos y escribirlos en el disco, pero también pueden agregarlos a archivos existentes usando la función `FILE` dentro de la aplicación `SET`. Este problema puede provocar una escalada de privilegios, la ejecución remota de código y/o blind server-side request forgery con un protocolo arbitrario. Las versiones de Asterisk 18.24.2, 20.9.2 y 21.4.2 y las versiones de asterisco certificado 18.9-cert11 y 20.7-cert2 contienen una solución para este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.1,"impactScore":3.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-267"},{"lang":"en","value":"CWE-1220"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*","versionEndExcluding":"18.24.2","matchCriteriaId":"7E883638-A227-4B23-ADEB-E54244B482F0"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:asterisk:*:*:*:*:*:*:*:*","versionStartIncluding":"19.0.0","versionEndExcluding":"20.9.1","matchCriteriaId":"525E1CCB-43F1-405D-96A9-A9D41D8F59CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:asterisk:21.4.0:*:*:*:*:*:*:*","matchCriteriaId":"8337584E-FAFD-456F-957C-7CDE4132E660"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:13.13.0:*:*:*:*:*:*:*","matchCriteriaId":"69C489FB-3A83-42D7-94A9-3C7D5B8F980C"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*","matchCriteriaId":"DD5636A9-1E9F-4DA7-8459-6B9257ADE0E4"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*","matchCriteriaId":"4DDBE806-CDD5-4981-B575-9EB58816CD7A"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*","matchCriteriaId":"A9676683-14B7-4489-9D18-C37365C323D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:*","matchCriteriaId":"660E2F8C-A674-44EE-99AC-80E57A0681C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:*","matchCriteriaId":"6949CB9E-8282-4E9D-9DD0-889E3181C845"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*","matchCriteriaId":"B54BB82E-92EF-4D75-8E62-10CDC7C526DC"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*","matchCriteriaId":"E759A991-D72D-4FCA-B4F5-3B51D63A31D3"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:13.13.0:rc1:*:*:*:*:*:*","matchCriteriaId":"D4E1A5B3-8385-4376-A145-1E1CC0E80818"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:13.13.0:rc2:*:*:*:*:*:*","matchCriteriaId":"3E4E78FF-000E-4DA8-8539-2C5507C09BB8"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*","matchCriteriaId":"20998BF5-7014-444C-A221-5B989987A7F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*","matchCriteriaId":"245E902A-1583-4482-9AD7-F0C5AF38764E"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*","matchCriteriaId":"282CF259-FEE3-44FC-808E-D96CCF48BFCA"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*","matchCriteriaId":"BEF5DDD6-7C6B-4E72-B3F3-7330C4488CA8"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8:cert1-rc5:*:*:*:*:*:*","matchCriteriaId":"675FED60-01B9-4A6F-B20C-D642121B873C"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8:cert10:*:*:*:*:*:*","matchCriteriaId":"3D6A228C-260F-484C-B169-EEDB0C66CB62"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8:cert11:*:*:*:*:*:*","matchCriteriaId":"7FFE0158-47D4-4FB4-84C8-49E67A181545"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8:cert12:*:*:*:*:*:*","matchCriteriaId":"CAC40CC0-5EC1-4F05-B1D1-7D06D2E10B5D"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8:cert13:*:*:*:*:*:*","matchCriteriaId":"3CDDFE32-9BAE-400C-8F6B-9792E9E0711C"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8:cert14:*:*:*:*:*:*","matchCriteriaId":"EB3952E1-6BA6-46D7-92F6-168EE8351E93"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*","matchCriteriaId":"67D6AA96-3579-41F5-B871-DA01F12CC8F8"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*","matchCriteriaId":"66E7DD42-CBC6-44F1-B06D-0B89CF624D51"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*","matchCriteriaId":"1EC0C26E-CCD2-4AEE-A35C-7A4DDA2E657E"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*","matchCriteriaId":"3CE9EC96-7A16-4989-98BC-440E9282FAC6"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8.0:-:*:*:*:*:*:*","matchCriteriaId":"335EF1B5-AD89-48E2-AB2C-BF376BC36F77"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*","matchCriteriaId":"E64BCD44-2298-4710-9CC3-DF82E6A8DF94"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert10:*:*:*:*:*:*","matchCriteriaId":"91CCAB0C-C0F8-4619-AAE1-F6F13FF31570"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert11:*:*:*:*:*:*","matchCriteriaId":"F2B7CBB3-E037-416B-AD16-9A553D6A4775"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert12:*:*:*:*:*:*","matchCriteriaId":"DE7DDFE1-6A06-477A-AB45-D00053CFA7EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*","matchCriteriaId":"A35C117A-6EFB-42EB-AD2A-EA7866606927"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*","matchCriteriaId":"40003CBE-792F-4875-9E60-6F1CE0BBAA8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*","matchCriteriaId":"46A7AA7B-13F2-496A-99ED-1CC13234E8CB"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*","matchCriteriaId":"147663CB-B48D-4D89-96BF-F92FF96F347F"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*","matchCriteriaId":"27DBBC83-930A-4ECE-8C1E-47481D881B0D"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert7:*:*:*:*:*:*","matchCriteriaId":"B987A13D-A363-4DCE-BBA1-E35E81ACBA60"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert8:*:*:*:*:*:*","matchCriteriaId":"01A5B7F9-FAD2-4C0C-937D-CF1086512130"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert9:*:*:*:*:*:*","matchCriteriaId":"F60B4271-F987-4932-86EE-45ED099661E1"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:18.9:cert1:*:*:*:*:*:*","matchCriteriaId":"4183072E-F5A2-4137-82B4-B066AC8DAAA9"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:18.9:cert1-rc1:*:*:*:*:*:*","matchCriteriaId":"3ABB4F01-021F-46C1-ABD4-412C7D40C52B"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:18.9:cert10:*:*:*:*:*:*","matchCriteriaId":"7B8A221A-E9DD-45EC-8DD6-7AFBC5A0B0D8"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:18.9:cert2:*:*:*:*:*:*","matchCriteriaId":"32177FB5-4C13-4E0C-AB67-F2B2F322581E"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:18.9:cert3:*:*:*:*:*:*","matchCriteriaId":"795DA8B6-FACE-4CC2-8262-1733A34F5593"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:18.9:cert4:*:*:*:*:*:*","matchCriteriaId":"CDBDB4E6-51AC-4707-85DF-9F76EF6629BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:18.9:cert5:*:*:*:*:*:*","matchCriteriaId":"BEC796F2-A349-4CCA-9343-5251DCA781A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:18.9:cert6:*:*:*:*:*:*","matchCriteriaId":"3AC09F75-406C-4699-A4D7-661383A05C05"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:18.9:cert7:*:*:*:*:*:*","matchCriteriaId":"02F5B177-0509-4CF7-A555-B9F41F50AE5E"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:18.9:cert8:*:*:*:*:*:*","matchCriteriaId":"237890E9-1AAB-4D02-801E-BC0C68A70718"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:18.9:cert8-rc1:*:*:*:*:*:*","matchCriteriaId":"D3064399-A01E-4E08-A4AE-4BA33A4928F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:18.9:cert8-rc2:*:*:*:*:*:*","matchCriteriaId":"FFA59ED7-2EE0-45EC-A794-8FA29B403A1C"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:18.9:cert9:*:*:*:*:*:*","matchCriteriaId":"C727C1DB-0287-412E-9107-AF276FF3AB2B"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:20.7:cert1:*:*:*:*:*:*","matchCriteriaId":"3520F2B3-3E3F-4222-AA97-B2F7F7BD30A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:20.7:cert1-rc1:*:*:*:*:*:*","matchCriteriaId":"56923D44-D1D5-4A79-AA36-5A0C45D22250"},{"vulnerable":true,"criteria":"cpe:2.3:a:asterisk:certified_asterisk:20.7:cert1-rc2:*:*:*:*:*:*","matchCriteriaId":"C669C229-8050-4938-8A05-11BFAB8D51FB"}]}]}],"references":[{"url":"https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44","source":"security-advisories@github.com","tags":["Exploit","Technical Description","Vendor Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00016.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}