CVE-2024-57520

9.8 CRITICAL

📋 TL;DR

CVE-2024-57520 is an insecure permissions vulnerability in Asterisk v22 that allows directory traversal via the action_createconfig function. This could enable arbitrary file creation outside the Asterisk directory. The vulnerability primarily affects Asterisk administrators with configuration management privileges, though the vendor disputes the severity, noting impact is limited to creating empty files.

💻 Affected Systems

Products:
  • Asterisk
Versions: v22 (specific subversions may vary)
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires privileged user access to configuration management functions. Vendor disputes severity, claiming impact limited to creating empty files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker with privileged access could execute arbitrary code by writing malicious files to sensitive locations, potentially leading to full system compromise.

🟠

Likely Case

Privileged user creates empty files in unintended directories, causing potential denial of service or configuration corruption.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to creating empty files in non-critical locations.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires privileged user credentials. Public proof-of-concept demonstrates directory traversal.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://github.com/asterisk/asterisk/issues/1122

Restart Required: No

Instructions:

Monitor Asterisk GitHub repository for official patches. Consider workarounds if immediate patching unavailable.

🔧 Temporary Workarounds

Restrict Configuration Access

linux

Limit access to Asterisk configuration management functions to only essential administrators.

# Review and restrict AMI/ARI user permissions in asterisk configuration
# Set appropriate file permissions on Asterisk configuration directories

Implement Directory Restrictions

linux

Use filesystem permissions and SELinux/AppArmor to restrict Asterisk's write access outside its directory.

# chmod 755 /etc/asterisk
# setsebool -P asterisk_disable_trans 1 (SELinux)
# Configure AppArmor profile for Asterisk

🧯 If You Can't Patch

  • Implement strict access controls for Asterisk administrative interfaces
  • Monitor for unusual file creation activities in system directories

🔍 How to Verify

Check if Vulnerable:

Check Asterisk version and review configuration for unrestricted access to action_createconfig function.

Check Version:

asterisk -V

Verify Fix Applied:

Verify no unauthorized file creation occurs when privileged users access configuration functions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation events in Asterisk logs
  • Configuration changes from unexpected sources

Network Indicators:

  • Suspicious AMI/ARI connections attempting configuration modifications

SIEM Query:

source="asterisk.log" AND ("action_createconfig" OR "file creation" OR "directory traversal")

🔗 References

📤 Share & Export