Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 19 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 include a web administration component that controls back-end Windows services using helper batch scripts located under C:\\F2MAdmin\\F2E\\AudioCodes_files\\utils\\Services. When certain service actions are requested through ajaxPost.php, these scripts are invoked by PHP using system() under the NT AUTHORITY\\SYSTEM account. The batch files in this directory are writable by any authenticated local user due to overly permissive ACLs, allowing them to replace script contents with arbitrary commands. On the next service start/stop operation, the modified script is executed as SYSTEM, enabling elevation of local privileges. | |
| Title | AudioCodes Fax/IVR Appliance <= 2.6.23 Insecure Service Control Scripts LPE | |
| Weaknesses | CWE-276 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-19T18:20:41.848Z
Reserved: 2025-04-15T19:15:22.586Z
Link: CVE-2025-34332
Updated: 2025-11-19T16:48:37.847Z
Status : Awaiting Analysis
Published: 2025-11-19T17:15:48.133
Modified: 2025-11-19T19:14:59.327
Link: CVE-2025-34332
No data.
OpenCVE Enrichment
No data.