CVE-2025-34334: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in AudioCodes Limited AudioCodes Fax/IVR Appliance
AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 are vulnerable to an authenticated command injection in the fax test functionality implemented by AudioCodes_files/TestFax.php. When a fax "send" test is requested, the application builds a faxsender command line using attacker-supplied parameters and passes it to GlobalUtils::RunBatchFile without proper validation or shell-argument sanitization. The resulting batch file is written into a temporary run directory and then executed via a backend service that runs as NT AUTHORITY\\SYSTEM. An authenticated attacker with access to the fax test interface can craft parameter values that inject additional shell commands into the generated batch file, leading to arbitrary command execution with SYSTEM privileges. In addition, because the generated batch files reside in a location with overly permissive file system permissions, a local low-privilege user on the server can modify pending batch files to achieve the same elevation.
AI Analysis
Technical Summary
CVE-2025-34334 is an OS command injection vulnerability classified under CWE-78 affecting AudioCodes Limited's Fax Server and Auto-Attendant IVR appliances up to version 2.6.23. The vulnerability arises from improper neutralization of special elements in user-supplied parameters within the fax test functionality implemented in AudioCodes_files/TestFax.php. When a fax send test is initiated, the application constructs a command line for the faxsender utility using these parameters without adequate validation or shell argument sanitization. This command line is then embedded into a batch file created in a temporary run directory. The batch file is executed by a backend service running with NT AUTHORITY\SYSTEM privileges, granting the executed commands full system rights. An authenticated attacker with access to the fax test interface can inject arbitrary shell commands into the batch file, leading to remote code execution with SYSTEM-level privileges. Furthermore, the batch files are stored in a directory with overly permissive file system permissions, allowing local low-privilege users to modify these files before execution, thereby escalating their privileges. The vulnerability requires authentication but no additional user interaction, and the attack vector is network accessible. The CVSS 4.0 base score is 8.7, indicating a high-severity issue with network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability. No known public exploits exist at this time, but the potential for severe impact on affected systems is significant, especially given the SYSTEM-level execution context.
Potential Impact
For European organizations, this vulnerability poses a critical risk to the security of telephony and fax infrastructure that relies on AudioCodes Fax Server and Auto-Attendant IVR appliances. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands with SYSTEM privileges, potentially resulting in data theft, service disruption, or lateral movement within the network. Confidentiality is at risk due to possible access to sensitive communications and stored data. Integrity and availability can be severely impacted by unauthorized modifications or denial of service caused by malicious commands. Given the appliance’s role in voice and fax communications, disruption could affect business continuity and regulatory compliance, especially in sectors like finance, healthcare, and government where secure communications are critical. The ability for local low-privilege users to escalate privileges also increases insider threat risks. The vulnerability’s network accessibility and lack of required user interaction make it a viable target for attackers once authentication is obtained, emphasizing the need for strict access controls and monitoring.
Mitigation Recommendations
1. Apply vendor patches immediately once released to address the command injection flaw. 2. Until patches are available, restrict access to the fax test interface to trusted administrators only, using network segmentation and firewall rules. 3. Implement strong authentication mechanisms and monitor authentication logs for suspicious activity. 4. Harden file system permissions on the temporary run directory to prevent unauthorized modification of batch files by local users. 5. Employ application-layer input validation and sanitization to ensure parameters passed to command lines do not contain shell metacharacters. 6. Use host-based intrusion detection systems (HIDS) to monitor for unusual command executions or file modifications in the appliance environment. 7. Regularly audit and review appliance configurations and access controls. 8. Consider isolating the fax/IVR appliance in a dedicated VLAN or network segment to limit exposure. 9. Educate administrators about the risks of authenticated interfaces and the importance of credential security. 10. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-34334: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in AudioCodes Limited AudioCodes Fax/IVR Appliance
Description
AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 are vulnerable to an authenticated command injection in the fax test functionality implemented by AudioCodes_files/TestFax.php. When a fax "send" test is requested, the application builds a faxsender command line using attacker-supplied parameters and passes it to GlobalUtils::RunBatchFile without proper validation or shell-argument sanitization. The resulting batch file is written into a temporary run directory and then executed via a backend service that runs as NT AUTHORITY\\SYSTEM. An authenticated attacker with access to the fax test interface can craft parameter values that inject additional shell commands into the generated batch file, leading to arbitrary command execution with SYSTEM privileges. In addition, because the generated batch files reside in a location with overly permissive file system permissions, a local low-privilege user on the server can modify pending batch files to achieve the same elevation.
AI-Powered Analysis
Technical Analysis
CVE-2025-34334 is an OS command injection vulnerability classified under CWE-78 affecting AudioCodes Limited's Fax Server and Auto-Attendant IVR appliances up to version 2.6.23. The vulnerability arises from improper neutralization of special elements in user-supplied parameters within the fax test functionality implemented in AudioCodes_files/TestFax.php. When a fax send test is initiated, the application constructs a command line for the faxsender utility using these parameters without adequate validation or shell argument sanitization. This command line is then embedded into a batch file created in a temporary run directory. The batch file is executed by a backend service running with NT AUTHORITY\SYSTEM privileges, granting the executed commands full system rights. An authenticated attacker with access to the fax test interface can inject arbitrary shell commands into the batch file, leading to remote code execution with SYSTEM-level privileges. Furthermore, the batch files are stored in a directory with overly permissive file system permissions, allowing local low-privilege users to modify these files before execution, thereby escalating their privileges. The vulnerability requires authentication but no additional user interaction, and the attack vector is network accessible. The CVSS 4.0 base score is 8.7, indicating a high-severity issue with network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability. No known public exploits exist at this time, but the potential for severe impact on affected systems is significant, especially given the SYSTEM-level execution context.
Potential Impact
For European organizations, this vulnerability poses a critical risk to the security of telephony and fax infrastructure that relies on AudioCodes Fax Server and Auto-Attendant IVR appliances. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary commands with SYSTEM privileges, potentially resulting in data theft, service disruption, or lateral movement within the network. Confidentiality is at risk due to possible access to sensitive communications and stored data. Integrity and availability can be severely impacted by unauthorized modifications or denial of service caused by malicious commands. Given the appliance’s role in voice and fax communications, disruption could affect business continuity and regulatory compliance, especially in sectors like finance, healthcare, and government where secure communications are critical. The ability for local low-privilege users to escalate privileges also increases insider threat risks. The vulnerability’s network accessibility and lack of required user interaction make it a viable target for attackers once authentication is obtained, emphasizing the need for strict access controls and monitoring.
Mitigation Recommendations
1. Apply vendor patches immediately once released to address the command injection flaw. 2. Until patches are available, restrict access to the fax test interface to trusted administrators only, using network segmentation and firewall rules. 3. Implement strong authentication mechanisms and monitor authentication logs for suspicious activity. 4. Harden file system permissions on the temporary run directory to prevent unauthorized modification of batch files by local users. 5. Employ application-layer input validation and sanitization to ensure parameters passed to command lines do not contain shell metacharacters. 6. Use host-based intrusion detection systems (HIDS) to monitor for unusual command executions or file modifications in the appliance environment. 7. Regularly audit and review appliance configurations and access controls. 8. Consider isolating the fax/IVR appliance in a dedicated VLAN or network segment to limit exposure. 9. Educate administrators about the risks of authenticated interfaces and the importance of credential security. 10. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.586Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691df24bcb9b476b7d51eb0d
Added to database: 11/19/2025, 4:37:31 PM
Last enriched: 11/26/2025, 5:06:28 PM
Last updated: 1/7/2026, 4:22:17 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.