Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34328: CWE-434 Unrestricted Upload of File with Dangerous Type in AudioCodes Limited AudioCodes Fax/IVR Appliance

0
Critical
VulnerabilityCVE-2025-34328cvecve-2025-34328cwe-434
Published: Wed Nov 19 2025 (11/19/2025, 16:22:22 UTC)
Source: CVE Database V5
Vendor/Project: AudioCodes Limited
Product: AudioCodes Fax/IVR Appliance

Description

AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 include a web administration component (F2MAdmin) that exposes an unauthenticated script-management endpoint at AudioCodes_files/utils/IVR/diagram/ajaxScript.php. The saveScript action writes attacker-supplied data directly to a server-side file path under the privileges of the web service account, which runs as NT AUTHORITY\\SYSTEM on Windows deployments. A remote, unauthenticated attacker can write arbitrary files into the product’s web-accessible directory structure and subsequently execute them.

AI-Powered Analysis

AILast updated: 11/19/2025, 16:54:01 UTC

Technical Analysis

CVE-2025-34328 is a critical unauthenticated remote code execution vulnerability affecting AudioCodes Fax Server and Auto-Attendant IVR appliances up to version 2.6.23. The flaw resides in the web administration component called F2MAdmin, specifically in the ajaxScript.php script-management endpoint. This endpoint exposes a 'saveScript' action that allows an attacker to write arbitrary data directly to server-side file paths without any authentication. Because the web service runs under the NT AUTHORITY\SYSTEM account on Windows deployments, any uploaded malicious file can be executed with full system privileges. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), enabling attackers to upload executable files or scripts into web-accessible directories. This leads to full remote code execution, complete system compromise, and potential lateral movement within the network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects that the attack requires no authentication or user interaction, has low complexity, and results in high confidentiality, integrity, and availability impacts. No patches or exploit code are currently publicly available, but the severity and ease of exploitation make this a critical threat. The vulnerability affects all versions up to 2.6.23, and the vendor has not yet released a patch. The attack surface includes any exposed management interfaces accessible remotely or internally without proper network controls.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially for those relying on AudioCodes Fax Server and IVR appliances in their telephony infrastructure. Successful exploitation allows attackers to gain SYSTEM-level access remotely without authentication, enabling full control over the affected device. This can lead to interception or manipulation of voice and fax communications, disruption of telephony services, and potential pivoting to other internal systems. Critical sectors such as telecommunications providers, financial institutions, government agencies, and large enterprises using these appliances for voice services are at heightened risk. The compromise of these systems could result in significant operational downtime, data breaches involving sensitive communications, and reputational damage. Given the central role of such appliances in unified communications, the availability and integrity of voice services could be severely impacted, affecting business continuity and regulatory compliance under European data protection laws.

Mitigation Recommendations

1. Immediately restrict network access to the AudioCodes Fax/IVR appliance management interfaces by implementing strict firewall rules and network segmentation, allowing access only from trusted administrative hosts. 2. Employ VPNs or zero-trust network access solutions to secure remote management connections. 3. Monitor web server logs and file system directories for unusual file uploads or modifications, especially in web-accessible directories. 4. Disable or restrict the vulnerable ajaxScript.php endpoint if possible, or apply web application firewall (WAF) rules to block unauthorized requests targeting this endpoint. 5. Regularly audit and inventory all AudioCodes appliances in the environment to ensure no unmanaged or exposed devices exist. 6. Engage with AudioCodes support for any available patches or workarounds and apply them promptly once released. 7. Implement endpoint detection and response (EDR) solutions on network segments hosting these appliances to detect anomalous behavior indicative of exploitation. 8. Educate network and security teams about this vulnerability to ensure rapid detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.586Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691df24bcb9b476b7d51eae9

Added to database: 11/19/2025, 4:37:31 PM

Last enriched: 11/19/2025, 4:54:01 PM

Last updated: 11/22/2025, 11:04:01 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats