Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34335: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in AudioCodes Limited AudioCodes Fax/IVR Appliance

0
High
VulnerabilityCVE-2025-34335cvecve-2025-34335cwe-78
Published: Wed Nov 19 2025 (11/19/2025, 16:24:06 UTC)
Source: CVE Database V5
Vendor/Project: AudioCodes Limited
Product: AudioCodes Fax/IVR Appliance

Description

AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 expose an authenticated command injection vulnerability in the license activation workflow handled by AudioCodes_files/ActivateLicense.php. When a license file is uploaded, the application derives a new filename by combining a generated base name with the attacker-controlled extension portion of the original upload name, then constructs a command line for fax_server_lic_cmdline.exe that includes this path. The extension value is incorporated into the command string without input validation, escaping, or proper argument quotation before being passed to exec(). An authenticated user with access to the license upload interface can supply a specially crafted filename whose extension injects additional shell metacharacters, causing arbitrary commands to be executed as NT AUTHORITY\\SYSTEM.

AI-Powered Analysis

AILast updated: 11/19/2025, 16:52:04 UTC

Technical Analysis

CVE-2025-34335 is an authenticated OS command injection vulnerability affecting AudioCodes Fax Server and Auto-Attendant IVR appliances up to version 2.6.23. The flaw exists in the license activation process, specifically in the AudioCodes_files/ActivateLicense.php script. When a license file is uploaded, the system generates a new filename by concatenating a base name with the extension extracted from the uploaded file's original name. However, the extension portion is attacker-controlled and incorporated into a command line executed by fax_server_lic_cmdline.exe without any input validation, escaping, or proper argument quoting. This allows an authenticated attacker to inject shell metacharacters into the filename extension, causing arbitrary commands to be executed with NT AUTHORITY\SYSTEM privileges on the underlying Windows system. The vulnerability requires only low privileges (authenticated user) and no user interaction beyond the upload. The CVSS 4.0 base score is 8.7, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no privileges required beyond authentication. Although no known exploits are currently reported in the wild, the vulnerability's nature and privilege escalation potential make it a critical risk. The affected product is widely used in telephony and fax infrastructure, which are often integral to enterprise communications and operations. The lack of input sanitization in a critical workflow highlights a severe design flaw that can lead to full system compromise.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to complete system compromise of AudioCodes Fax/IVR appliances, which are often deployed in critical telephony and communication infrastructures. Attackers gaining NT AUTHORITY\SYSTEM privileges can execute arbitrary commands, potentially leading to data exfiltration, disruption of fax and IVR services, lateral movement within networks, and persistent backdoors. Given the role of these appliances in enterprise communications, successful exploitation could disrupt business operations, cause data breaches, and impact regulatory compliance, especially under GDPR. The high privilege level and network accessibility of the vulnerable component increase the risk of widespread damage. Organizations relying on these appliances for customer interaction or internal communications may face operational downtime and reputational damage. Additionally, attackers could leverage compromised appliances as footholds for further attacks on corporate networks or critical infrastructure, amplifying the threat to European entities.

Mitigation Recommendations

1. Immediately restrict access to the license upload interface to trusted administrators only, using network segmentation, VPNs, or IP whitelisting. 2. Monitor and log all license file uploads and related command executions for suspicious activity or anomalous filenames. 3. Implement strict input validation and sanitization on filename extensions in the license activation workflow to prevent injection of shell metacharacters. 4. Apply vendor patches or updates as soon as they become available; maintain close contact with AudioCodes for security advisories. 5. Consider deploying application-layer firewalls or endpoint detection solutions that can detect and block command injection attempts targeting the fax_server_lic_cmdline.exe process. 6. Conduct regular security audits and penetration tests focusing on telephony and fax infrastructure components. 7. Educate administrators on the risks of uploading untrusted files and enforce strong authentication and authorization controls on management interfaces. 8. If patching is delayed, consider isolating the vulnerable appliances from broader networks to limit potential attack vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.587Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691df24bcb9b476b7d51eb13

Added to database: 11/19/2025, 4:37:31 PM

Last enriched: 11/19/2025, 4:52:04 PM

Last updated: 11/19/2025, 7:05:24 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats