Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34333: CWE-276 Incorrect Default Permissions in AudioCodes Limited AudioCodes Fax/IVR Appliance

0
High
VulnerabilityCVE-2025-34333cvecve-2025-34333cwe-276
Published: Wed Nov 19 2025 (11/19/2025, 16:21:42 UTC)
Source: CVE Database V5
Vendor/Project: AudioCodes Limited
Product: AudioCodes Fax/IVR Appliance

Description

AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 configure the web document root at C:\\F2MAdmin\\F2E with overly permissive file system permissions. Authenticated local users have modify rights on this directory, while the associated web server process runs as NT AUTHORITY\\SYSTEM. As a result, any local user can create or alter server-side scripts within the webroot and then trigger them via HTTP requests, causing arbitrary code to execute with SYSTEM privileges.

AI-Powered Analysis

AILast updated: 11/19/2025, 16:52:49 UTC

Technical Analysis

CVE-2025-34333 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting AudioCodes Limited's Fax Server and Auto-Attendant IVR appliances, specifically versions up to and including 2.6.23. The root cause is overly permissive file system permissions on the web document root directory located at C:\F2MAdmin\F2E. Authenticated local users have modify rights on this directory, enabling them to create or alter server-side scripts. The associated web server process runs with NT AUTHORITY\SYSTEM privileges, which means any script executed by the web server inherits these high-level privileges. An attacker with local authenticated access can therefore place malicious scripts in the webroot and trigger them remotely via HTTP requests, resulting in arbitrary code execution with SYSTEM-level privileges. This vulnerability does not require user interaction and has a low attack complexity, but it does require local authentication. The CVSS 4.0 base score is 8.5, reflecting high impact on confidentiality, integrity, and availability due to the potential for full system compromise. No public exploits have been reported yet, but the vulnerability poses a significant risk given the elevated privileges and ease of exploitation once local access is obtained. The lack of available patches at the time of publication necessitates immediate attention to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a critical risk to telephony and fax infrastructure relying on AudioCodes Fax Server and IVR appliances. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary code with SYSTEM privileges, potentially disrupting communication services, intercepting or manipulating sensitive voice and fax data, and pivoting to other internal systems. This can result in significant operational downtime, data breaches, and loss of service integrity. Given the role of these appliances in business-critical communications, the impact extends to regulatory compliance issues, especially under GDPR where data confidentiality is paramount. Organizations in sectors such as finance, healthcare, and government, which often rely on secure telephony systems, are particularly vulnerable. The requirement for local authenticated access limits remote exploitation but insider threats or compromised credentials could facilitate attacks. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the potential severity.

Mitigation Recommendations

To mitigate CVE-2025-34333, European organizations should first verify if they are running affected versions (up to 2.6.23) of AudioCodes Fax Server or Auto-Attendant IVR appliances. Immediate steps include restricting local user permissions on the web document root directory (C:\F2MAdmin\F2E) to remove modify rights for non-administrative users. Implement strict access controls and monitoring for local accounts to detect unauthorized access attempts. Network segmentation should isolate these appliances from general user networks to reduce the risk of local access by unauthorized users. Employ multi-factor authentication (MFA) for all local accounts to mitigate credential compromise risks. Regularly audit file system permissions and monitor web server directories for unauthorized script changes. If possible, disable or limit HTTP access to the webroot directory or configure the web server to run with least privilege rather than SYSTEM. Engage with AudioCodes for patches or updates and apply them promptly once available. Additionally, implement endpoint detection and response (EDR) solutions to detect anomalous script execution or privilege escalation attempts on these devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.586Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691df24bcb9b476b7d51eb07

Added to database: 11/19/2025, 4:37:31 PM

Last enriched: 11/19/2025, 4:52:49 PM

Last updated: 11/19/2025, 6:44:59 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats