CVE-2025-1131 Affecting asterisk package, versions <1:16.28.0~dfsg-0+deb11u8


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-ASTERISK-13018976
  • published24 Sept 2025
  • disclosed23 Sept 2025

Introduced: 23 Sep 2025

NewCVE-2025-1131  (opens in a new tab)

How to fix?

Upgrade Debian:11 asterisk to version 1:16.28.0~dfsg-0+deb11u8 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream asterisk package and not the asterisk package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions.

Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.

CVSS Base Scores

version 3.1