CVE-2025-34331: CWE-306 Missing Authentication for Critical Function in AudioCodes Limited AudioCodes Fax/IVR Appliance
AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 contain an unauthenticated file read vulnerability via the download.php script. The endpoint exposes a file download mechanism that lacks access control, allowing remote, unauthenticated users to request files stored on the appliance based solely on attacker-supplied path and filename parameters. While limited to specific file extensions permitted by the application logic, sensitive backup archives can be retrieved, exposing internal databases and credential hashes. Successful exploitation may lead to disclosure of administrative password hashes and other sensitive configuration data.
AI Analysis
Technical Summary
CVE-2025-34331 is a critical vulnerability categorized under CWE-306 (Missing Authentication for Critical Function) found in AudioCodes Limited's Fax Server and Auto-Attendant IVR appliances, specifically versions up to and including 2.6.23. The vulnerability resides in the download.php script, which implements a file download mechanism without enforcing access control or authentication. This flaw allows remote attackers to specify arbitrary file paths and filenames within allowed file extensions to retrieve files stored on the appliance. Although the application logic restricts downloads to specific file types, sensitive backup archives containing internal databases and credential hashes are accessible. These archives may include administrative password hashes and other sensitive configuration data, leading to potential compromise of administrative credentials and internal system information. The vulnerability is remotely exploitable over the network without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, with low attack complexity and no privileges required. No patches have been linked yet, and no active exploitation has been reported, but the exposure of sensitive data could facilitate further attacks or unauthorized access if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of critical telephony infrastructure. AudioCodes Fax and IVR appliances are commonly used in enterprise voice and fax communications, including in sectors such as finance, healthcare, and government. Exposure of administrative password hashes and configuration data could lead to unauthorized administrative access, enabling attackers to manipulate voice services, intercept communications, or disrupt operations. The compromise of backup archives may also reveal sensitive customer or internal data, violating data protection regulations such as GDPR. The lack of authentication and ease of exploitation means attackers can remotely access sensitive files without prior access, increasing the likelihood of targeted or opportunistic attacks. This could result in operational disruption, reputational damage, and regulatory penalties for affected organizations.
Mitigation Recommendations
Organizations should immediately verify if they are running affected versions of AudioCodes Fax Server or Auto-Attendant IVR appliances (up to 2.6.23). Until a vendor patch is available, network-level mitigations should be applied, including restricting access to the management interface and download.php endpoint via firewall rules or network segmentation, allowing only trusted IP addresses. Monitoring and logging access to the appliance should be enhanced to detect unusual file download requests. Administrators should change all administrative passwords and consider reissuing credentials if compromise is suspected. Additionally, organizations should review backup storage and ensure sensitive archives are protected with encryption and access controls. Regular vulnerability scanning and penetration testing focusing on telephony infrastructure can help identify exploitation attempts. Once a vendor patch is released, prompt application is critical. Engaging with AudioCodes support for guidance and updates is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-34331: CWE-306 Missing Authentication for Critical Function in AudioCodes Limited AudioCodes Fax/IVR Appliance
Description
AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 contain an unauthenticated file read vulnerability via the download.php script. The endpoint exposes a file download mechanism that lacks access control, allowing remote, unauthenticated users to request files stored on the appliance based solely on attacker-supplied path and filename parameters. While limited to specific file extensions permitted by the application logic, sensitive backup archives can be retrieved, exposing internal databases and credential hashes. Successful exploitation may lead to disclosure of administrative password hashes and other sensitive configuration data.
AI-Powered Analysis
Technical Analysis
CVE-2025-34331 is a critical vulnerability categorized under CWE-306 (Missing Authentication for Critical Function) found in AudioCodes Limited's Fax Server and Auto-Attendant IVR appliances, specifically versions up to and including 2.6.23. The vulnerability resides in the download.php script, which implements a file download mechanism without enforcing access control or authentication. This flaw allows remote attackers to specify arbitrary file paths and filenames within allowed file extensions to retrieve files stored on the appliance. Although the application logic restricts downloads to specific file types, sensitive backup archives containing internal databases and credential hashes are accessible. These archives may include administrative password hashes and other sensitive configuration data, leading to potential compromise of administrative credentials and internal system information. The vulnerability is remotely exploitable over the network without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, with low attack complexity and no privileges required. No patches have been linked yet, and no active exploitation has been reported, but the exposure of sensitive data could facilitate further attacks or unauthorized access if exploited.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of critical telephony infrastructure. AudioCodes Fax and IVR appliances are commonly used in enterprise voice and fax communications, including in sectors such as finance, healthcare, and government. Exposure of administrative password hashes and configuration data could lead to unauthorized administrative access, enabling attackers to manipulate voice services, intercept communications, or disrupt operations. The compromise of backup archives may also reveal sensitive customer or internal data, violating data protection regulations such as GDPR. The lack of authentication and ease of exploitation means attackers can remotely access sensitive files without prior access, increasing the likelihood of targeted or opportunistic attacks. This could result in operational disruption, reputational damage, and regulatory penalties for affected organizations.
Mitigation Recommendations
Organizations should immediately verify if they are running affected versions of AudioCodes Fax Server or Auto-Attendant IVR appliances (up to 2.6.23). Until a vendor patch is available, network-level mitigations should be applied, including restricting access to the management interface and download.php endpoint via firewall rules or network segmentation, allowing only trusted IP addresses. Monitoring and logging access to the appliance should be enhanced to detect unusual file download requests. Administrators should change all administrative passwords and consider reissuing credentials if compromise is suspected. Additionally, organizations should review backup storage and ensure sensitive archives are protected with encryption and access controls. Regular vulnerability scanning and penetration testing focusing on telephony infrastructure can help identify exploitation attempts. Once a vendor patch is released, prompt application is critical. Engaging with AudioCodes support for guidance and updates is recommended.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.586Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691df24bcb9b476b7d51eafb
Added to database: 11/19/2025, 4:37:31 PM
Last enriched: 11/26/2025, 5:05:49 PM
Last updated: 1/7/2026, 10:25:30 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68637: CWE-297 Improper Validation of Certificate with Host Mismatch in Apache Software Foundation Apache Uniffle
UnknownCVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.