CVE-2025-34332: CWE-276 Incorrect Default Permissions in AudioCodes Limited AudioCodes Fax/IVR Appliance
AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 include a web administration component that controls back-end Windows services using helper batch scripts located under C:\\F2MAdmin\\F2E\\AudioCodes_files\\utils\\Services. When certain service actions are requested through ajaxPost.php, these scripts are invoked by PHP using system() under the NT AUTHORITY\\SYSTEM account. The batch files in this directory are writable by any authenticated local user due to overly permissive ACLs, allowing them to replace script contents with arbitrary commands. On the next service start/stop operation, the modified script is executed as SYSTEM, enabling elevation of local privileges.
AI Analysis
Technical Summary
CVE-2025-34332 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting AudioCodes Fax Server and Auto-Attendant IVR appliances up to version 2.6.23. The affected devices include a web administration interface that manages backend Windows services through helper batch scripts located in the directory C:\F2MAdmin\F2E\AudioCodes_files\utils\Services. These batch files are executed by PHP scripts (ajaxPost.php) using the system() call under the NT AUTHORITY\SYSTEM account. Due to overly permissive Access Control Lists (ACLs), any authenticated local user can write to these batch files, replacing their contents with arbitrary commands. When a service start or stop operation is triggered, the modified batch script executes with SYSTEM privileges, enabling elevation of local privileges. This flaw does not require user interaction and can be exploited with low complexity since the attacker only needs authenticated local access. The vulnerability impacts confidentiality, integrity, and availability by allowing attackers to execute arbitrary commands as SYSTEM, potentially leading to full system compromise. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects local attack vector, low attack complexity, no authentication required beyond local user privileges, and high impact on confidentiality, integrity, and availability. No patches are currently linked, and no exploits are known in the wild, but the risk remains significant due to the nature of the flaw and the criticality of the affected systems in telephony infrastructure.
Potential Impact
For European organizations, this vulnerability poses a serious risk especially to those relying on AudioCodes Fax Server and IVR appliances for telephony and fax services. Successful exploitation allows an authenticated local user to escalate privileges to SYSTEM level, potentially leading to full control over the appliance and underlying Windows system. This can result in unauthorized access to sensitive communications, disruption of telephony services, and lateral movement within the network. Given the critical role of these appliances in business communications, exploitation could impact operational continuity and data confidentiality. The vulnerability is particularly concerning for sectors with stringent regulatory requirements such as finance, healthcare, and government agencies in Europe. Additionally, the lack of known exploits currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
Immediate mitigation should focus on restricting write permissions to the batch script directory (C:\F2MAdmin\F2E\AudioCodes_files\utils\Services) to trusted administrative accounts only, removing write access from all authenticated local users. Organizations should audit and harden ACLs on these files and directories to enforce the principle of least privilege. Network segmentation and strict access controls should limit local user access to the affected appliances. Monitoring and alerting for unexpected modifications to these batch files or unusual service start/stop operations can provide early detection. Until official patches are released, consider disabling or restricting the web administration interface if feasible. Vendors and customers should engage with AudioCodes for timely patch deployment once available. Additionally, enforcing strong authentication and limiting local user accounts on these appliances reduces the attack surface.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-34332: CWE-276 Incorrect Default Permissions in AudioCodes Limited AudioCodes Fax/IVR Appliance
Description
AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 include a web administration component that controls back-end Windows services using helper batch scripts located under C:\\F2MAdmin\\F2E\\AudioCodes_files\\utils\\Services. When certain service actions are requested through ajaxPost.php, these scripts are invoked by PHP using system() under the NT AUTHORITY\\SYSTEM account. The batch files in this directory are writable by any authenticated local user due to overly permissive ACLs, allowing them to replace script contents with arbitrary commands. On the next service start/stop operation, the modified script is executed as SYSTEM, enabling elevation of local privileges.
AI-Powered Analysis
Technical Analysis
CVE-2025-34332 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting AudioCodes Fax Server and Auto-Attendant IVR appliances up to version 2.6.23. The affected devices include a web administration interface that manages backend Windows services through helper batch scripts located in the directory C:\F2MAdmin\F2E\AudioCodes_files\utils\Services. These batch files are executed by PHP scripts (ajaxPost.php) using the system() call under the NT AUTHORITY\SYSTEM account. Due to overly permissive Access Control Lists (ACLs), any authenticated local user can write to these batch files, replacing their contents with arbitrary commands. When a service start or stop operation is triggered, the modified batch script executes with SYSTEM privileges, enabling elevation of local privileges. This flaw does not require user interaction and can be exploited with low complexity since the attacker only needs authenticated local access. The vulnerability impacts confidentiality, integrity, and availability by allowing attackers to execute arbitrary commands as SYSTEM, potentially leading to full system compromise. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects local attack vector, low attack complexity, no authentication required beyond local user privileges, and high impact on confidentiality, integrity, and availability. No patches are currently linked, and no exploits are known in the wild, but the risk remains significant due to the nature of the flaw and the criticality of the affected systems in telephony infrastructure.
Potential Impact
For European organizations, this vulnerability poses a serious risk especially to those relying on AudioCodes Fax Server and IVR appliances for telephony and fax services. Successful exploitation allows an authenticated local user to escalate privileges to SYSTEM level, potentially leading to full control over the appliance and underlying Windows system. This can result in unauthorized access to sensitive communications, disruption of telephony services, and lateral movement within the network. Given the critical role of these appliances in business communications, exploitation could impact operational continuity and data confidentiality. The vulnerability is particularly concerning for sectors with stringent regulatory requirements such as finance, healthcare, and government agencies in Europe. Additionally, the lack of known exploits currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
Immediate mitigation should focus on restricting write permissions to the batch script directory (C:\F2MAdmin\F2E\AudioCodes_files\utils\Services) to trusted administrative accounts only, removing write access from all authenticated local users. Organizations should audit and harden ACLs on these files and directories to enforce the principle of least privilege. Network segmentation and strict access controls should limit local user access to the affected appliances. Monitoring and alerting for unexpected modifications to these batch files or unusual service start/stop operations can provide early detection. Until official patches are released, consider disabling or restricting the web administration interface if feasible. Vendors and customers should engage with AudioCodes for timely patch deployment once available. Additionally, enforcing strong authentication and limiting local user accounts on these appliances reduces the attack surface.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.586Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691df24bcb9b476b7d51eb01
Added to database: 11/19/2025, 4:37:31 PM
Last enriched: 11/26/2025, 5:06:03 PM
Last updated: 1/7/2026, 8:49:39 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.