Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4326-1 | asterisk security update |
EUVD |
EUVD-2025-30828 | A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart. |
Sat, 28 Feb 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Mon, 03 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 08 Oct 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sangoma
Sangoma asterisk Sangoma certified Asterisk |
|
| CPEs | cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1-rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert10:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert11:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert12:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert13:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert14:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert15:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert3:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert4:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert5:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert6:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert7:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert8-rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert8-rc2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert8:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert9:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1-rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1-rc2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert3:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert4:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert5:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert6:*:*:*:*:*:* |
|
| Vendors & Products |
Sangoma
Sangoma asterisk Sangoma certified Asterisk |
|
| Metrics |
cvssV3_1
|
Tue, 23 Sep 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 23 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Asterisk
Asterisk asterisk |
|
| Vendors & Products |
Asterisk
Asterisk asterisk |
Tue, 23 Sep 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions. Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart. | |
| Title | Asterisk Unsafe Shell Sourcing in safe_asterisk Leads to Local Privilege Escalation | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Gridware
Published:
Updated: 2026-02-26T17:48:19.381Z
Reserved: 2025-02-08T04:11:43.201Z
Link: CVE-2025-1131
Updated: 2025-11-03T17:31:42.189Z
Status : Modified
Published: 2025-09-23T05:15:35.603
Modified: 2025-11-03T18:15:48.883
Link: CVE-2025-1131
No data.
OpenCVE Enrichment
Updated: 2025-09-23T16:03:28Z
Debian DLA
EUVD