CVE-2025-47779

Name
CVE-2025-47779
Description
Asterisk is an open-source private branch exchange (PBX). Prior to versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk, SIP requests of the type MESSAGE (RFC 3428) authentication do not get proper alignment. An authenticated attacker can spoof any user identity to send spam messages to the user with their authorization token. Abuse of this security issue allows authenticated attackers to send fake chat messages can be spoofed to appear to come from trusted entities. Even administrators who follow Security best practices and Security Considerations can be impacted. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. Versions 18.26.2, 20.14.1, 21.9.1, and 22.4.1 of Asterisk and versions 18.9-cert14 and 20.7-cert5 of certified-asterisk fix the issue.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/asterisk/asterisk/blob/master/configs/samples/pjsip.conf.sample
CONFIRM https://github.com/asterisk/asterisk/security/advisories/GHSA-2grh-7mhv-fcfw

Match rules

CPE URI Source package Min version Max version
asterisk >= 0 < 18.9-cert14
asterisk >= 18.10 < 18.26.2
asterisk >= 20.0 < 20.7-cert5
asterisk >= 20.8 < 20.14.1
asterisk >= 21.0 < 21.9.1
asterisk >= 22.0 < 22.4.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
asterisk edge-main 20.11.0-r0 Timo Teras <timo.teras@iki.fi> possibly vulnerable
asterisk edge-main 20.11.0-r1 Timo Teras <timo.teras@iki.fi> possibly vulnerable
asterisk edge-main 20.11.1-r0 Timo Teras <timo.teras@iki.fi> possibly vulnerable
asterisk edge-main 20.11.1-r1 Timo Teras <timo.teras@iki.fi> possibly vulnerable
asterisk edge-main 20.11.1-r3 Timo Teras <timo.teras@iki.fi> possibly vulnerable
asterisk edge-main 20.11.1-r4 Timo Teras <timo.teras@iki.fi> possibly vulnerable
asterisk edge-main 20.11.1-r5 Timo Teras <timo.teras@iki.fi> possibly vulnerable