CVE-2024-42365

Public Exploit
Asterisk allows `Write=originate` as sufficient permissions for code execution / `System()` dialplan

Description

Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue.

Category

7.4
CVSS
Severity: High
CVSS 3.1 •
EPSS 34.36% Top 5%
Vendor Advisory github.com
Affected: asterisk asterisk
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-42365?
CVE-2024-42365 has been scored as a high severity vulnerability.
How to fix CVE-2024-42365?
To fix CVE-2024-42365, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-42365 being actively exploited in the wild?
It is possible that CVE-2024-42365 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~34% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-42365?
CVE-2024-42365 affects asterisk asterisk.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.