Plugins Database As of 12-11-2019

Asterisk Multiple Vulnerabilities (AST-2019-006, AST-2019-007)

General
Impact by CVSS Score
  • ID: 1.3.6.1.4.1.25623.1.0.143163

CVSS Base Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C

Detection Type:
Remote Banner Unreliable

Solution Type:
Vendor Patch

Summary:
Asterisk is prone to multiple vulnerabilities.

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
Asterisk is prone to multiple vulnerabilities: - AMI user could execute system commands (CVE-2019-18610) - SIP request can change address of a SIP peer (CVE-2019-18790)

Affected Versions:
Asterisk Open Source 13.x, 16.x, 17.x and 13.21 Certified Asterisk.

Recommendations:
Upgrade to Version 13.29.2, 16.6.2, 17.0.1, 13.21-cert5 or later.

Search
Severity
High
CVSS Score
7.1
Published
2019-11-22 03:15:57
Modified
2019-11-22 03:30:14
CVE
CVE-2019-18790
CVE-2019-18610

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.