CVE-2025-67513

N/A Unknown

📋 TL;DR

FreePBX Endpoint Manager versions before 16.0.96 and 17.0.1 through 17.0.9 have a weak default password (app_password) that is a 6-digit numeric value, making it susceptible to brute-force attacks. This vulnerability could allow attackers to gain unauthorized access to telephony endpoints, potentially compromising extension, voicemail, user manager, DPMA, or EPM phone admin passwords. Affected users are those running vulnerable FreePBX systems with the Endpoint Manager module installed.

💻 Affected Systems

Products:
  • FreePBX Endpoint Manager
Versions: Versions prior to 16.0.96 and 17.0.1 through 17.0.9
Operating Systems: Linux-based systems running FreePBX
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration with a weak 6-digit numeric password; custom configurations may vary in risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could brute-force the default password, gain administrative access to telephony endpoints, and potentially compromise sensitive data, disrupt communications, or pivot to other systems.

🟠

Likely Case

Attackers may exploit this to access voicemail or extension settings, leading to unauthorized call interception, data theft, or service disruption.

🟢

If Mitigated

With strong password policies and network segmentation, the impact is limited to isolated systems, reducing the risk of widespread compromise.

🌐 Internet-Facing: HIGH if the system is exposed to the internet, as brute-force attacks can be automated and executed remotely.
🏢 Internal Only: MEDIUM if the system is internal-only, as insider threats or compromised internal hosts could still exploit the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of the target system and involves brute-forcing a predictable password, which is straightforward with automated tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.0.96 and 17.0.10

Vendor Advisory: https://github.com/FreePBX/security-reporting/security/advisories/GHSA-426v-c5p7-cp29

Restart Required: No

Instructions:

1. Log into the FreePBX web interface. 2. Navigate to the Module Admin section. 3. Check for updates and install version 16.0.96 or 17.0.10 of the Endpoint Manager module. 4. Apply the update and verify the installation.

🔧 Temporary Workarounds

Change Default Password

linux

Manually change the weak default password (app_password) to a strong, complex password to prevent brute-force attacks.

Access the FreePBX Endpoint Manager settings via the web interface and update the password field with a secure value.

🧯 If You Can't Patch

  • Implement network segmentation to isolate the FreePBX system from untrusted networks.
  • Enable rate limiting or account lockout policies to deter brute-force attempts.

🔍 How to Verify

Check if Vulnerable:

Check the Endpoint Manager module version in the FreePBX web interface under Module Admin; if it is below 16.0.96 or between 17.0.1 and 17.0.9, it is vulnerable.

Check Version:

In FreePBX, run from SSH: fwconsole ma list | grep endpoint

Verify Fix Applied:

After updating, confirm the module version is 16.0.96 or 17.0.10 or higher in the Module Admin section.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts to the Endpoint Manager interface in FreePBX logs
  • Unusual access patterns or successful logins from unknown IPs

Network Indicators:

  • Increased traffic to the FreePBX web port (typically 443) with repetitive POST requests
  • Brute-force tool signatures in network traffic

SIEM Query:

source="FreePBX" AND (event="login_failed" OR event="login_success") AND user="app_password" | stats count by src_ip

🔗 References

📤 Share & Export