CVE-2023-49786

CVSS 3.1 Score 5.9 of 10 (medium)

Details

Published Dec 14, 2023
Updated: Dec 29, 2023
CWE ID 362
CWE ID 703

Summary

CVE-2023-49786 is a vulnerability in the Asterisk private branch exchange and telephony toolkit. It affects Asterisk versions 18.20.1, 20.5.1, and 21.0.1, as well as certified-asterisk version 18.9-cert6. The vulnerability is caused by a race condition in the hello handshake phase of the DTLS protocol when handling DTLS-SRTP for media setup, which can lead to a denial of service (DoS) attack by continuously denying new DTLS-SRTP encrypted calls during the attack. The vulnerability has a base severity rating of MEDIUM with a base score of 5.9 according to NIST's National Vulnerability Database (NVD). The exploitability score is 2.2, and it requires no privileges or user interaction to execute the attack. The impact score is 3.6, indicating high availability impact but no impact on confidentiality or integrity. The vulnerability can be mitigated by updating to fixed versions 18.20.1, 20.5.1, or 21.0.1, or using certified-asterisk version 18.9-cert6 which contains the fix for this issue.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-49786 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options