top of page
perceptive_background_267k.jpg

Sangoma FreePBX Endpoint Manager contains an OS command injection vulnerability that could allow for a post-authentication command injection by an authenticated…

Published:

3 februari 2026 om 00:00:00

Alert date:

3 februari 2026 om 16:03:37

Source:

cisa.gov

Click to open the original link from this advisory

Network Infrastructure, Enterprise Applications

Sangoma FreePBX Endpoint Manager contains an OS command injection vulnerability that allows authenticated users to execute commands through the testconnection -> check_ssh_connect() function. The vulnerability requires post-authentication access but can lead to remote system access as the asterisk user. This affects the FreePBX system which is commonly used for VoIP and telephony management. The vulnerability has been assigned CVE-2025-64328 and has security advisories published on GitHub. Organizations using Sangoma FreePBX should review the security advisory and apply necessary patches or mitigations.

Technical details

Mitigation steps:

Affected products:

Sangoma FreePBX

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page