Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Feb 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sangoma
Sangoma asterisk Sangoma certified Asterisk |
|
| CPEs | cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:13.13.0:-:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:13.13.0:cert3:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:13.13.0:rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:13.13.0:rc2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8.0:-:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert10:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert11:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert12:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert3:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert4:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert5:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert6:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert7:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert8:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8.0:cert9:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8:cert1-rc5:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8:cert10:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8:cert11:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8:cert12:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8:cert13:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8:cert14:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:-:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1-rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert10:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert11:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert12:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert13:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert14:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert15:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert16:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert3:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert4:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert5:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert6:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert7:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert8-rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert8-rc2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert8:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:18.9:cert9:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1-rc1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1-rc2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert1:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert2:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert3:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert4:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert5:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert6:*:*:*:*:*:* cpe:2.3:a:sangoma:certified_asterisk:20.7:cert7:*:*:*:*:*:* |
|
| Vendors & Products |
Sangoma
Sangoma asterisk Sangoma certified Asterisk |
Tue, 10 Feb 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-379 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Asterisk
Asterisk asterisk |
|
| Vendors & Products |
Asterisk
Asterisk asterisk |
Fri, 06 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Fri, 06 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Feb 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, when ast_coredumper writes its gdb init and output files to a directory that is world-writable (for example /tmp), an attacker with write permission(which is all users on a linux system) to that directory can cause root to execute arbitrary commands or overwrite arbitrary files by controlling the gdb init file and output paths. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2. | |
| Title | Asterisk vulnerable to potential privilege escalation | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-06T19:11:55.655Z
Reserved: 2026-01-15T15:45:01.958Z
Link: CVE-2026-23740
Updated: 2026-02-06T17:33:48.909Z
Status : Analyzed
Published: 2026-02-06T17:16:26.290
Modified: 2026-02-10T18:25:39.730
Link: CVE-2026-23740
OpenCVE Enrichment
Updated: 2026-02-09T10:50:24Z