CVE-2022-37325: n/a in n/a
In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and 19.x through 19.6.0, an incoming Setup message to addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can cause a crash.
AI Analysis
Technical Summary
CVE-2022-37325 is a high-severity vulnerability affecting Sangoma Asterisk versions up to 16.28.0, all 17.x versions, 18.x versions through 18.14.0, and 19.x versions through 19.6.0. The vulnerability resides in the handling of incoming Setup messages within the H.323 protocol implementation, specifically in the addons/ooh323c/src/ooq931.c component. When an attacker sends a malformed Calling or Called Party Information Element (IE) in the Setup message, it triggers a memory corruption issue classified as a buffer overflow (CWE-787). This leads to a crash of the Asterisk service, causing a denial of service (DoS) condition. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability, with no confidentiality or integrity loss indicated. There are no known exploits in the wild as of the published date, and no official patches have been linked in the provided data. The vulnerability affects the core telephony platform widely used for VoIP services, PBX systems, and unified communications, particularly where H.323 protocol support is enabled. Exploitation requires sending a specially crafted H.323 Setup message to the vulnerable Asterisk instance, which is typically exposed on telephony signaling ports. Successful exploitation results in service disruption due to process crashes, potentially impacting business communications and telephony-dependent operations.
Potential Impact
For European organizations, the impact of CVE-2022-37325 can be significant, especially for enterprises, service providers, and public sector entities relying on Sangoma Asterisk for their telephony infrastructure. The denial of service caused by the crash of Asterisk can disrupt voice communications, affecting customer service centers, emergency response lines, and internal communications. This disruption can lead to operational downtime, loss of productivity, and reputational damage. Critical sectors such as healthcare, finance, and government agencies that depend on reliable telephony services may face increased risk. Additionally, organizations using H.323 protocol for legacy or interconnect purposes are particularly vulnerable. While the vulnerability does not allow data theft or unauthorized access, the availability impact alone can have cascading effects on business continuity and incident response capabilities. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the low complexity of attack and no authentication requirements.
Mitigation Recommendations
To mitigate CVE-2022-37325 effectively, European organizations should: 1) Immediately audit their telephony infrastructure to identify all Asterisk instances and verify the versions in use, focusing on those with H.323 protocol support enabled. 2) Disable the H.323 module (ooh323) if it is not required for business operations, as this removes the attack surface entirely. 3) Where H.323 is necessary, implement network-level protections such as firewall rules to restrict access to Asterisk signaling ports (typically TCP 1720) to trusted IP addresses only. 4) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection for malformed H.323 messages to detect and block suspicious traffic. 5) Monitor Asterisk logs and system health for unexpected crashes or restarts that could indicate exploitation attempts. 6) Engage with Sangoma or trusted vendors for patches or updated versions that address this vulnerability as soon as they become available. 7) Consider deploying redundant telephony infrastructure or failover mechanisms to maintain service continuity in case of DoS events. 8) Conduct regular security assessments and penetration tests focusing on telephony protocols and services to proactively identify and remediate vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2022-37325: n/a in n/a
Description
In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and 19.x through 19.6.0, an incoming Setup message to addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can cause a crash.
AI-Powered Analysis
Technical Analysis
CVE-2022-37325 is a high-severity vulnerability affecting Sangoma Asterisk versions up to 16.28.0, all 17.x versions, 18.x versions through 18.14.0, and 19.x versions through 19.6.0. The vulnerability resides in the handling of incoming Setup messages within the H.323 protocol implementation, specifically in the addons/ooh323c/src/ooq931.c component. When an attacker sends a malformed Calling or Called Party Information Element (IE) in the Setup message, it triggers a memory corruption issue classified as a buffer overflow (CWE-787). This leads to a crash of the Asterisk service, causing a denial of service (DoS) condition. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability, with no confidentiality or integrity loss indicated. There are no known exploits in the wild as of the published date, and no official patches have been linked in the provided data. The vulnerability affects the core telephony platform widely used for VoIP services, PBX systems, and unified communications, particularly where H.323 protocol support is enabled. Exploitation requires sending a specially crafted H.323 Setup message to the vulnerable Asterisk instance, which is typically exposed on telephony signaling ports. Successful exploitation results in service disruption due to process crashes, potentially impacting business communications and telephony-dependent operations.
Potential Impact
For European organizations, the impact of CVE-2022-37325 can be significant, especially for enterprises, service providers, and public sector entities relying on Sangoma Asterisk for their telephony infrastructure. The denial of service caused by the crash of Asterisk can disrupt voice communications, affecting customer service centers, emergency response lines, and internal communications. This disruption can lead to operational downtime, loss of productivity, and reputational damage. Critical sectors such as healthcare, finance, and government agencies that depend on reliable telephony services may face increased risk. Additionally, organizations using H.323 protocol for legacy or interconnect purposes are particularly vulnerable. While the vulnerability does not allow data theft or unauthorized access, the availability impact alone can have cascading effects on business continuity and incident response capabilities. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the low complexity of attack and no authentication requirements.
Mitigation Recommendations
To mitigate CVE-2022-37325 effectively, European organizations should: 1) Immediately audit their telephony infrastructure to identify all Asterisk instances and verify the versions in use, focusing on those with H.323 protocol support enabled. 2) Disable the H.323 module (ooh323) if it is not required for business operations, as this removes the attack surface entirely. 3) Where H.323 is necessary, implement network-level protections such as firewall rules to restrict access to Asterisk signaling ports (typically TCP 1720) to trusted IP addresses only. 4) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection for malformed H.323 messages to detect and block suspicious traffic. 5) Monitor Asterisk logs and system health for unexpected crashes or restarts that could indicate exploitation attempts. 6) Engage with Sangoma or trusted vendors for patches or updated versions that address this vulnerability as soon as they become available. 7) Consider deploying redundant telephony infrastructure or failover mechanisms to maintain service continuity in case of DoS events. 8) Conduct regular security assessments and penetration tests focusing on telephony protocols and services to proactively identify and remediate vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-08-01T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9840c4522896dcbf11cb
Added to database: 5/21/2025, 9:09:20 AM
Last enriched: 6/22/2025, 1:35:49 AM
Last updated: 7/26/2025, 1:00:05 AM
Views: 10
Related Threats
CVE-2025-8285: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54525: CWE-1287: Improper Validation of Specified Type of Input in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54478: CWE-306: Missing Authentication for Critical Function in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54463: CWE-754: Improper Check for Unusual or Exceptional Conditions in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54458: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.