CVE-2024-53566

5.5 MEDIUM

📋 TL;DR

A path traversal vulnerability in the action_listcategories() function of Asterisk allows attackers to access files outside the intended directory. This affects Asterisk versions 22.0.0 through 22.0.0-rc2 when the Manager interface is enabled. Attackers could potentially read sensitive configuration files or system information.

💻 Affected Systems

Products:
  • Sangoma Asterisk
Versions: 22.0.0, 22.0.0-rc1, 22.0.0-rc2, 22.0.0-pre1
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ✅ No
Notes: Requires Manager interface to be enabled and accessible. Default Asterisk installations typically have Manager disabled or properly secured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files with credentials, or other protected data, potentially leading to further system compromise.

🟠

Likely Case

Unauthorized reading of Asterisk configuration files, potentially exposing passwords, API keys, or other sensitive configuration data.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized access to the Manager interface.

🌐 Internet-Facing: HIGH if Manager interface is exposed to the internet without proper authentication and access controls.
🏢 Internal Only: MEDIUM if Manager interface is accessible on internal networks, as internal attackers could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the Asterisk Manager Interface (AMI). The vulnerability is in the action_listcategories() function which handles file path validation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 22.0.1 or later

Vendor Advisory: https://lists.debian.org/debian-lts-announce/2025/02/msg00003.html

Restart Required: Yes

Instructions:

1. Update Asterisk to version 22.0.1 or later. 2. Restart the Asterisk service. 3. Verify the patch is applied by checking the version.

🔧 Temporary Workarounds

Disable Manager Interface

linux

Disable the Asterisk Manager Interface if not required for operations.

Edit /etc/asterisk/manager.conf and comment out or remove the [general] section or set enabled = no
Restart Asterisk: systemctl restart asterisk

Restrict Manager Interface Access

linux

Configure firewall rules to restrict access to the Manager Interface port (default 5038).

iptables -A INPUT -p tcp --dport 5038 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 5038 -j DROP

🧯 If You Can't Patch

  • Disable the Asterisk Manager Interface entirely if not needed.
  • Implement strict network access controls to limit Manager Interface access to trusted IP addresses only.

🔍 How to Verify

Check if Vulnerable:

Check Asterisk version with 'asterisk -V' and verify if it's 22.0.0, 22.0.0-rc1, 22.0.0-rc2, or 22.0.0-pre1. Also check if manager.conf has enabled = yes.

Check Version:

asterisk -V

Verify Fix Applied:

Verify Asterisk version is 22.0.1 or later with 'asterisk -V'. Test Manager Interface functionality to ensure it still works properly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Manager Interface access attempts
  • Failed authentication attempts to Manager Interface
  • Access to unexpected file paths in logs

Network Indicators:

  • Unusual traffic to port 5038 (default Manager Interface port)
  • Traffic patterns indicating path traversal attempts

SIEM Query:

source="asterisk.log" AND ("Manager" OR "action_listcategories" OR "path traversal")

🔗 References

📤 Share & Export