CVE-2025-34334

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary commands with SYSTEM privileges on AudioCodes Fax Server and Auto-Attendant IVR appliances. Attackers can exploit the fax test functionality to inject shell commands that run with highest system permissions. Organizations using affected AudioCodes appliances up to version 2.6.23 are at risk.

💻 Affected Systems

Products:
  • AudioCodes Fax Server
  • AudioCodes Auto-Attendant IVR
Versions: Up to and including 2.6.23
Operating Systems: Windows-based appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the fax test interface. Local low-privilege users can also exploit via file permission issues.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing attackers to install persistent backdoors, steal sensitive data, disable security controls, and pivot to other network systems.

🟠

Likely Case

Authenticated attackers gaining full control of the appliance, potentially accessing fax communications, modifying IVR configurations, and using the system as a foothold for lateral movement.

🟢

If Mitigated

Limited impact if strong network segmentation, strict access controls, and monitoring are in place, though the vulnerability still provides SYSTEM-level access if exploited.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Detailed technical analysis and exploitation details are publicly available in security advisories. Requires authenticated access but exploitation is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://www.audiocodes.com/media/g1in2u2o/0548-product-notice-end-of-service-for-audiocodes-auto-attendant-ivr-solution.pdf

Restart Required: No

Instructions:

No official patch available. AudioCodes has announced end-of-service for these products. Consider migrating to supported solutions or implementing workarounds.

🔧 Temporary Workarounds

Disable Fax Test Functionality

windows

Remove or restrict access to the vulnerable TestFax.php interface

Move or rename AudioCodes_files/TestFax.php to disable the vulnerable endpoint

Restrict File Permissions

windows

Secure the temporary run directory to prevent local privilege escalation

icacls "C:\path\to\temp\run\directory" /inheritance:r /grant "NT AUTHORITY\SYSTEM":F /grant "Administrators":F

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected appliances from critical systems
  • Enforce strong authentication controls and limit access to administrative interfaces to only necessary personnel

🔍 How to Verify

Check if Vulnerable:

Check appliance version via web interface or command line. If version is 2.6.23 or earlier, the system is vulnerable.

Check Version:

Check web interface admin panel or examine installed software in Windows Control Panel

Verify Fix Applied:

Verify TestFax.php is no longer accessible and temporary directory permissions are restricted

📡 Detection & Monitoring

Log Indicators:

  • Unusual fax test activity
  • Batch file execution in temporary directories
  • Commands with unusual parameters in faxsender processes

Network Indicators:

  • HTTP requests to TestFax.php with suspicious parameters
  • Outbound connections from appliance to unexpected destinations

SIEM Query:

source="audiocodes_appliance" AND (uri="*TestFax.php*" OR process="faxsender" AND cmd="*&*" OR cmd="*|*")

🔗 References

📤 Share & Export