CVE Vulnerabilities

CVE-2025-49832

NULL Pointer Dereference

Published: Aug 01, 2025 | Modified: Aug 25, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Asterisk is an open source private branch exchange and telephony toolkit. In versions up to and including 18.26.2, between 20.00.0 and 20.15.0, 20.7-cert6, 21.00.0, 22.00.0 through 22.5.0, there is a remote DoS and possible RCE condition in asterisk/res/res_stir_shaken /verification.c that can be exploited when an attacker can set an arbitrary Identity header, or STIR/SHAKEN is enabled, with verification set in the SIP profile associated with the endpoint to be attacked. This is fixed in versions 18.26.3, 20.7-cert6, 20.15.1, 21.10.1 and 22.5.1.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
AsteriskSangoma*18.26.3 (excluding)
AsteriskSangoma20.0.0 (including)20.15.1 (excluding)
AsteriskSangoma21.0.0 (including)21.10.1 (excluding)
AsteriskSangoma22.0.0 (including)22.5.1 (excluding)
AsteriskUbuntuplucky*
AsteriskUbuntuupstream*

Potential Mitigations

References