{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T10:10:35.728","vulnerabilities":[{"cve":{"id":"CVE-2026-23741","sourceIdentifier":"security-advisories@github.com","published":"2026-02-06T17:16:26.427","lastModified":"2026-02-18T18:42:31.550","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the asterisk/contrib/scripts/ast_coredumper runs as root, as noted by the NOTES tag on line 689 of the ast_coredumper file. The script will source the contents of /etc/asterisk/ast_debug_tools.conf, which resides in a folder that is writeable by the asterisk user:group. Due to the /etc/asterisk/ast_debug_tools.conf file following bash semantics and it being loaded; an attacker with write permissions may add or modify the file such that when the root ast_coredumper is run; it would source and thereby execute arbitrary bash code found in the /etc/asterisk/ast_debug_tools.conf. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2."},{"lang":"es","value":"Asterisk es un kit de herramientas de telefonía y centralita privada de código abierto. Antes de las versiones 20.7-cert9, 20.18.2, 21.12.1, 22.8.2 y 23.2.2, el script asterisk/contrib/scripts/ast_coredumper se ejecuta como root, como se indica en la etiqueta NOTES en la línea 689 del archivo ast_coredumper. El script obtendrá el contenido de /etc/asterisk/ast_debug_tools.conf, que reside en una carpeta que es escribible por el usuario:grupo asterisk. Debido a que el archivo /etc/asterisk/ast_debug_tools.conf sigue la semántica de bash y a que se carga; un atacante con permisos de escritura puede añadir o modificar el archivo de tal manera que cuando se ejecute el ast_coredumper de root; este obtendría y, por lo tanto, ejecutaría código bash arbitrario encontrado en el /etc/asterisk/ast_debug_tools.conf. Este problema ha sido parcheado en las versiones 20.7-cert9, 20.18.2, 21.12.1, 22.8.2 y 23.2.2."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:N","baseScore":0.0,"baseSeverity":"NONE","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":0.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-427"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*","versionEndExcluding":"20.18.2","matchCriteriaId":"46AC3571-DD52-4F3C-98D2-3BB915498D41"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*","versionStartIncluding":"21.0.0","versionEndExcluding":"21.12.1","matchCriteriaId":"B9CB7760-849C-42CB-BF9A-A3DB40F19447"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*","versionStartIncluding":"22.0.0","versionEndExcluding":"22.8.2","matchCriteriaId":"03AEEF8D-B546-4587-A236-63E2C41582FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*","versionStartIncluding":"23.0.0","versionEndExcluding":"23.2.2","matchCriteriaId":"B036D768-9ADA-4965-A596-BEF60749C3CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:*:*:*:*:*:*:*:*","versionEndIncluding":"18.9","matchCriteriaId":"44460225-C50D-414A-A2E0-F8280E1C1E1D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1:*:*:*:*:*:*","matchCriteriaId":"79225576-AF7C-4099-9624-C53578A7417F"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1-rc1:*:*:*:*:*:*","matchCriteriaId":"29323E6E-12C9-46C7-B29C-25E0CD537A8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1-rc2:*:*:*:*:*:*","matchCriteriaId":"8E563972-78C0-40A0-83EA-6A3BA3D71946"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert2:*:*:*:*:*:*","matchCriteriaId":"64209621-D458-432A-B0E3-C8D0B6698574"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert3:*:*:*:*:*:*","matchCriteriaId":"B148158A-8354-41C2-A44C-2C0DAABAD217"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert4:*:*:*:*:*:*","matchCriteriaId":"3D4D96E8-1F01-42B8-9181-67DEB12D9DD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert5:*:*:*:*:*:*","matchCriteriaId":"50D1B02A-F5F9-48EB-A396-412821F5D602"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert6:*:*:*:*:*:*","matchCriteriaId":"4CBB2891-448F-4C4E-8A47-2283A8F71FE6"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert7:*:*:*:*:*:*","matchCriteriaId":"A9AF30E9-FC50-4A5C-BC99-9B3394488B9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:sangoma:certified_asterisk:20.7:cert8:*:*:*:*:*:*","matchCriteriaId":"1A41366F-EA16-4867-A198-ACFFE5AFEA9A"}]}]}],"references":[{"url":"https://github.com/asterisk/asterisk/security/advisories/GHSA-rvch-3jmx-3jf3","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}