AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 are vulnerable to an authenticated command injection in the fax test functionality implemented by AudioCodes_files/TestFax.php. When a fax "send" test is requested, the application builds a faxsender command line using attacker-supplied parameters and passes it to GlobalUtils::RunBatchFile without proper validation or shell-argument sanitization. The resulting batch file is written into a temporary run directory and then executed via a backend service that runs as NT AUTHORITY\\SYSTEM. An authenticated attacker with access to the fax test interface can craft parameter values that inject additional shell commands into the generated batch file, leading to arbitrary command execution with SYSTEM privileges. In addition, because the generated batch files reside in a location with overly permissive file system permissions, a local low-privilege user on the server can modify pending batch files to achieve the same elevation.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 11 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Audiocodes fax Server
Audiocodes interactive Voice Response
CPEs cpe:2.3:a:audiocodes:fax_server:*:*:*:*:*:*:*:*
cpe:2.3:a:audiocodes:interactive_voice_response:*:*:*:*:*:*:*:*
Vendors & Products Audiocodes fax Server
Audiocodes interactive Voice Response
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 20 Nov 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Audiocodes
Audiocodes fax\/ivr
CPEs cpe:2.3:h:audiocodes:fax\/ivr:*:*:*:*:*:*:*:*
Vendors & Products Audiocodes
Audiocodes fax\/ivr

Wed, 19 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
Description AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 are vulnerable to an authenticated command injection in the fax test functionality implemented by AudioCodes_files/TestFax.php. When a fax "send" test is requested, the application builds a faxsender command line using attacker-supplied parameters and passes it to GlobalUtils::RunBatchFile without proper validation or shell-argument sanitization. The resulting batch file is written into a temporary run directory and then executed via a backend service that runs as NT AUTHORITY\\SYSTEM. An authenticated attacker with access to the fax test interface can craft parameter values that inject additional shell commands into the generated batch file, leading to arbitrary command execution with SYSTEM privileges. In addition, because the generated batch files reside in a location with overly permissive file system permissions, a local low-privilege user on the server can modify pending batch files to achieve the same elevation.
Title AudioCodes Fax/IVR Appliance <= 2.6.23 Authenticated Command Injection via TestFax.php & LPE
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-11-20T15:21:17.531Z

Reserved: 2025-04-15T19:15:22.586Z

Link: CVE-2025-34334

cve-icon Vulnrichment

Updated: 2025-11-19T16:48:28.634Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-19T17:15:48.703

Modified: 2025-12-11T21:12:50.690

Link: CVE-2025-34334

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses