Skip to main content

CVE-2022-37325: n/a in n/a

High
VulnerabilityCVE-2022-37325cvecve-2022-37325n-acwe-787
Published: Mon Dec 05 2022 (12/05/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and 19.x through 19.6.0, an incoming Setup message to addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can cause a crash.

AI-Powered Analysis

AILast updated: 06/22/2025, 01:35:49 UTC

Technical Analysis

CVE-2022-37325 is a high-severity vulnerability affecting Sangoma Asterisk versions up to 16.28.0, all 17.x versions, 18.x versions through 18.14.0, and 19.x versions through 19.6.0. The vulnerability resides in the handling of incoming Setup messages within the H.323 protocol implementation, specifically in the addons/ooh323c/src/ooq931.c component. When an attacker sends a malformed Calling or Called Party Information Element (IE) in the Setup message, it triggers a memory corruption issue classified as a buffer overflow (CWE-787). This leads to a crash of the Asterisk service, causing a denial of service (DoS) condition. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability, with no confidentiality or integrity loss indicated. There are no known exploits in the wild as of the published date, and no official patches have been linked in the provided data. The vulnerability affects the core telephony platform widely used for VoIP services, PBX systems, and unified communications, particularly where H.323 protocol support is enabled. Exploitation requires sending a specially crafted H.323 Setup message to the vulnerable Asterisk instance, which is typically exposed on telephony signaling ports. Successful exploitation results in service disruption due to process crashes, potentially impacting business communications and telephony-dependent operations.

Potential Impact

For European organizations, the impact of CVE-2022-37325 can be significant, especially for enterprises, service providers, and public sector entities relying on Sangoma Asterisk for their telephony infrastructure. The denial of service caused by the crash of Asterisk can disrupt voice communications, affecting customer service centers, emergency response lines, and internal communications. This disruption can lead to operational downtime, loss of productivity, and reputational damage. Critical sectors such as healthcare, finance, and government agencies that depend on reliable telephony services may face increased risk. Additionally, organizations using H.323 protocol for legacy or interconnect purposes are particularly vulnerable. While the vulnerability does not allow data theft or unauthorized access, the availability impact alone can have cascading effects on business continuity and incident response capabilities. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the low complexity of attack and no authentication requirements.

Mitigation Recommendations

To mitigate CVE-2022-37325 effectively, European organizations should: 1) Immediately audit their telephony infrastructure to identify all Asterisk instances and verify the versions in use, focusing on those with H.323 protocol support enabled. 2) Disable the H.323 module (ooh323) if it is not required for business operations, as this removes the attack surface entirely. 3) Where H.323 is necessary, implement network-level protections such as firewall rules to restrict access to Asterisk signaling ports (typically TCP 1720) to trusted IP addresses only. 4) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection for malformed H.323 messages to detect and block suspicious traffic. 5) Monitor Asterisk logs and system health for unexpected crashes or restarts that could indicate exploitation attempts. 6) Engage with Sangoma or trusted vendors for patches or updated versions that address this vulnerability as soon as they become available. 7) Consider deploying redundant telephony infrastructure or failover mechanisms to maintain service continuity in case of DoS events. 8) Conduct regular security assessments and penetration tests focusing on telephony protocols and services to proactively identify and remediate vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-08-01T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf11cb

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/22/2025, 1:35:49 AM

Last updated: 7/26/2025, 1:00:05 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats