Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34331: CWE-306 Missing Authentication for Critical Function in AudioCodes Limited AudioCodes Fax/IVR Appliance

0
High
VulnerabilityCVE-2025-34331cvecve-2025-34331cwe-306
Published: Wed Nov 19 2025 (11/19/2025, 16:22:50 UTC)
Source: CVE Database V5
Vendor/Project: AudioCodes Limited
Product: AudioCodes Fax/IVR Appliance

Description

AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 contain an unauthenticated file read vulnerability via the download.php script. The endpoint exposes a file download mechanism that lacks access control, allowing remote, unauthenticated users to request files stored on the appliance based solely on attacker-supplied path and filename parameters. While limited to specific file extensions permitted by the application logic, sensitive backup archives can be retrieved, exposing internal databases and credential hashes. Successful exploitation may lead to disclosure of administrative password hashes and other sensitive configuration data.

AI-Powered Analysis

AILast updated: 11/26/2025, 17:05:49 UTC

Technical Analysis

CVE-2025-34331 is a critical vulnerability categorized under CWE-306 (Missing Authentication for Critical Function) found in AudioCodes Limited's Fax Server and Auto-Attendant IVR appliances, specifically versions up to and including 2.6.23. The vulnerability resides in the download.php script, which implements a file download mechanism without enforcing access control or authentication. This flaw allows remote attackers to specify arbitrary file paths and filenames within allowed file extensions to retrieve files stored on the appliance. Although the application logic restricts downloads to specific file types, sensitive backup archives containing internal databases and credential hashes are accessible. These archives may include administrative password hashes and other sensitive configuration data, leading to potential compromise of administrative credentials and internal system information. The vulnerability is remotely exploitable over the network without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, with low attack complexity and no privileges required. No patches have been linked yet, and no active exploitation has been reported, but the exposure of sensitive data could facilitate further attacks or unauthorized access if exploited.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of critical telephony infrastructure. AudioCodes Fax and IVR appliances are commonly used in enterprise voice and fax communications, including in sectors such as finance, healthcare, and government. Exposure of administrative password hashes and configuration data could lead to unauthorized administrative access, enabling attackers to manipulate voice services, intercept communications, or disrupt operations. The compromise of backup archives may also reveal sensitive customer or internal data, violating data protection regulations such as GDPR. The lack of authentication and ease of exploitation means attackers can remotely access sensitive files without prior access, increasing the likelihood of targeted or opportunistic attacks. This could result in operational disruption, reputational damage, and regulatory penalties for affected organizations.

Mitigation Recommendations

Organizations should immediately verify if they are running affected versions of AudioCodes Fax Server or Auto-Attendant IVR appliances (up to 2.6.23). Until a vendor patch is available, network-level mitigations should be applied, including restricting access to the management interface and download.php endpoint via firewall rules or network segmentation, allowing only trusted IP addresses. Monitoring and logging access to the appliance should be enhanced to detect unusual file download requests. Administrators should change all administrative passwords and consider reissuing credentials if compromise is suspected. Additionally, organizations should review backup storage and ensure sensitive archives are protected with encryption and access controls. Regular vulnerability scanning and penetration testing focusing on telephony infrastructure can help identify exploitation attempts. Once a vendor patch is released, prompt application is critical. Engaging with AudioCodes support for guidance and updates is recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.586Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691df24bcb9b476b7d51eafb

Added to database: 11/19/2025, 4:37:31 PM

Last enriched: 11/26/2025, 5:05:49 PM

Last updated: 1/7/2026, 10:25:30 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats