CVE-2025-34330

5.3 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to upload files to AudioCodes Fax Server and Auto-Attendant IVR appliances via an unprotected web endpoint. Attackers can tamper with IVR audio content or prepare files for further attacks. Organizations using affected AudioCodes appliances with web administration exposed are at risk.

💻 Affected Systems

Products:
  • AudioCodes Fax Server
  • AudioCodes Auto-Attendant IVR
Versions: Up to and including 2.6.23
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects appliances with the F2MAdmin web administration component enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could upload malicious files that enable remote code execution or compromise the IVR system, potentially leading to complete system takeover or service disruption.

🟠

Likely Case

Attackers tamper with IVR audio prompts or music-on-hold files, causing service disruption, brand damage, or preparing for phishing/social engineering attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to tampering with audio files in the temporary directory.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request to the vulnerable endpoint with file upload. Public exploit details available in referenced advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://www.audiocodes.com/media/g1in2u2o/0548-product-notice-end-of-service-for-audiocodes-auto-attendant-ivr-solution.pdf

Restart Required: No

Instructions:

No official patch available. AudioCodes has announced end-of-service for affected products. Consider migration to supported solutions.

🔧 Temporary Workarounds

Block Access to Vulnerable Endpoint

all

Use web application firewall or network firewall to block access to /AudioCodes_files/utils/IVR/diagram/ajaxPromptUploadFile.php

Disable Web Administration Interface

windows

Disable or restrict access to the F2MAdmin web interface if not required

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected appliances from untrusted networks
  • Deploy web application firewall with file upload restrictions and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if the endpoint http://[appliance-ip]/AudioCodes_files/utils/IVR/diagram/ajaxPromptUploadFile.php is accessible and accepts file uploads without authentication

Check Version:

Check appliance web interface or documentation for version information

Verify Fix Applied:

Verify the endpoint is no longer accessible or requires authentication, and file uploads are blocked

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /AudioCodes_files/utils/IVR/diagram/ajaxPromptUploadFile.php
  • File creation in C:\F2MAdmin\tmp directory

Network Indicators:

  • HTTP traffic to the vulnerable endpoint with file upload content
  • Unusual file upload patterns to the appliance

SIEM Query:

source="web_logs" AND uri="/AudioCodes_files/utils/IVR/diagram/ajaxPromptUploadFile.php" AND method="POST"

🔗 References

📤 Share & Export