Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 11 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Audiocodes fax Server
Audiocodes interactive Voice Response |
|
| CPEs | cpe:2.3:a:audiocodes:fax_server:*:*:*:*:*:*:*:* cpe:2.3:a:audiocodes:interactive_voice_response:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Audiocodes fax Server
Audiocodes interactive Voice Response |
|
| Metrics |
cvssV3_1
|
Thu, 20 Nov 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Audiocodes
Audiocodes fax\/ivr |
|
| CPEs | cpe:2.3:h:audiocodes:fax\/ivr:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Audiocodes
Audiocodes fax\/ivr |
Wed, 19 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 configure the web document root at C:\\F2MAdmin\\F2E with overly permissive file system permissions. Authenticated local users have modify rights on this directory, while the associated web server process runs as NT AUTHORITY\\SYSTEM. As a result, any local user can create or alter server-side scripts within the webroot and then trigger them via HTTP requests, causing arbitrary code to execute with SYSTEM privileges. | |
| Title | AudioCodes Fax/IVR Appliance <= 2.6.23 World-Writable Webroot LPE | |
| Weaknesses | CWE-276 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-20T15:21:17.350Z
Reserved: 2025-04-15T19:15:22.586Z
Link: CVE-2025-34333
Updated: 2025-11-19T16:47:33.998Z
Status : Analyzed
Published: 2025-11-19T17:15:48.500
Modified: 2025-12-11T21:18:46.983
Link: CVE-2025-34333
No data.
OpenCVE Enrichment
No data.