CVE-2023-49786

CVSS 3.1 Score 5.9 of 10 (medium)

Details

Published Dec 14, 2023
Updated: Dec 29, 2023
CWE ID 362
CWE ID 703

Summary

CVE-2023-49786 is a vulnerability in the Asterisk private branch exchange and telephony toolkit. It affects Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk version 18.9-cert6. The vulnerability is caused by a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup, which can lead to a denial of service (DoS) attack by continuously denying new DTLS-SRTP encrypted calls during the attack. The vulnerability has a base severity rating of MEDIUM with a base score of 5.9 according to NIST's National Vulnerability Database (NVD). The exploitability score is 2.2, and it requires no privileges or user interaction to execute the attack. The impact score is 3.6, indicating high availability impact but no impact on confidentiality or integrity. The vulnerability can be mitigated by updating to fixed versions 18.20.1, 20.5.1, or 21.0.1, or using certified-asterisk version 18.9-cert6 which contains the fix for this issue.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-49786 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions