CVE-2025-66039

9.8 CRITICAL

📋 TL;DR

FreePBX Endpoint Manager versions before 16.0.44 and 17.0.23 contain an authentication bypass vulnerability when using webserver authentication. Attackers can send arbitrary Authorization headers to gain unauthorized access as any user without valid credentials. This affects all FreePBX systems using the vulnerable Endpoint Manager module with webserver authentication enabled.

💻 Affected Systems

Products:
  • FreePBX Endpoint Manager
Versions: All versions before 16.0.44 and 17.0.23
Operating Systems: Any OS running FreePBX
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when authentication type is set to 'webserver' in Endpoint Manager configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to take over telephony endpoints, intercept calls, modify configurations, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized access to endpoint management functions allowing attackers to reconfigure phones, eavesdrop on communications, or disrupt telephony services.

🟢

If Mitigated

Limited impact if webserver authentication is disabled or systems are isolated from untrusted networks.

🌐 Internet-Facing: HIGH - Systems exposed to the internet are directly exploitable without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request manipulation with arbitrary Authorization header value.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.0.44 or 17.0.23

Vendor Advisory: https://github.com/FreePBX/security-reporting/security/advisories/GHSA-9jvh-mv6x-w698

Restart Required: Yes

Instructions:

1. Log into FreePBX admin interface. 2. Navigate to Module Admin. 3. Check for updates. 4. Update Endpoint Manager to version 16.0.44 or 17.0.23. 5. Apply configuration changes. 6. Restart affected services.

🔧 Temporary Workarounds

Disable webserver authentication

all

Change authentication type to a non-webserver method in Endpoint Manager configuration

Network isolation

linux

Restrict access to FreePBX web interface to trusted networks only

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Change authentication method from 'webserver' to another supported method in Endpoint Manager settings
  • Implement strict network access controls to limit exposure to the FreePBX web interface

🔍 How to Verify

Check if Vulnerable:

Check Endpoint Manager version in FreePBX admin interface and verify if webserver authentication is enabled

Check Version:

fwconsole ma list | grep endpoint

Verify Fix Applied:

Confirm Endpoint Manager version is 16.0.44 or higher (for v16) or 17.0.23 or higher (for v17)

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts with malformed Authorization headers
  • Endpoint configuration changes from unexpected IP addresses
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • HTTP requests to /admin/config.php?display=endpoint with arbitrary Authorization headers
  • Unusual traffic patterns to endpoint management endpoints

SIEM Query:

source="freepbx.log" AND ("Authorization:" AND NOT "session=") OR ("endpoint" AND "config.php" AND status=200)

🔗 References

📤 Share & Export