Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34335: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in AudioCodes Limited AudioCodes Fax/IVR Appliance

0
High
VulnerabilityCVE-2025-34335cvecve-2025-34335cwe-78
Published: Wed Nov 19 2025 (11/19/2025, 16:24:06 UTC)
Source: CVE Database V5
Vendor/Project: AudioCodes Limited
Product: AudioCodes Fax/IVR Appliance

Description

AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 expose an authenticated command injection vulnerability in the license activation workflow handled by AudioCodes_files/ActivateLicense.php. When a license file is uploaded, the application derives a new filename by combining a generated base name with the attacker-controlled extension portion of the original upload name, then constructs a command line for fax_server_lic_cmdline.exe that includes this path. The extension value is incorporated into the command string without input validation, escaping, or proper argument quotation before being passed to exec(). An authenticated user with access to the license upload interface can supply a specially crafted filename whose extension injects additional shell metacharacters, causing arbitrary commands to be executed as NT AUTHORITY\\SYSTEM.

AI-Powered Analysis

AILast updated: 11/26/2025, 16:56:28 UTC

Technical Analysis

CVE-2025-34335 is an authenticated OS command injection vulnerability affecting AudioCodes Fax Server and Auto-Attendant IVR appliances up to version 2.6.23. The vulnerability arises in the license activation process, specifically within the AudioCodes_files/ActivateLicense.php script. When a license file is uploaded, the application generates a new filename by concatenating a base name with the extension extracted from the original uploaded file name. This extension is attacker-controlled and incorporated directly into a command line string executed by fax_server_lic_cmdline.exe without any input validation, escaping, or proper argument quoting. As a result, an authenticated user can craft a filename extension containing shell metacharacters to inject arbitrary commands. These commands execute with NT AUTHORITY\SYSTEM privileges, granting full control over the appliance. The vulnerability requires authentication but no additional user interaction. The CVSS 4.0 score is 8.7 (high severity), reflecting the network attack vector, low complexity, no privileges required beyond authentication, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability poses a critical risk due to the elevated privileges and potential for complete system compromise. The affected product is widely used in telephony and fax infrastructure, making it a valuable target for attackers aiming to disrupt communications or gain footholds in enterprise environments.

Potential Impact

The impact on European organizations is significant, particularly for those relying on AudioCodes Fax/IVR appliances in telecommunications, government, healthcare, and critical infrastructure sectors. Exploitation allows attackers to execute arbitrary commands as SYSTEM, leading to full device compromise, data theft, service disruption, or pivoting into internal networks. Confidentiality is at high risk due to potential access to sensitive communications and license data. Integrity and availability can be severely affected by malicious modifications or denial of service. Given the appliance’s role in telephony and fax services, exploitation could disrupt critical communication channels. The requirement for authentication limits exposure but does not eliminate risk, as insider threats or compromised credentials could enable attacks. The lack of public exploits currently provides a window for mitigation, but the high severity score and ease of exploitation warrant urgent attention.

Mitigation Recommendations

1. Immediately restrict access to the license upload interface to trusted administrators only, using network segmentation and strong authentication mechanisms such as multi-factor authentication (MFA). 2. Monitor and audit all license upload activities and system logs for suspicious filename patterns or command execution anomalies. 3. Implement strict input validation and sanitization on the filename extension field if possible via configuration or custom scripting to block shell metacharacters. 4. Disable or isolate the license activation functionality temporarily if feasible until a vendor patch is available. 5. Coordinate with AudioCodes for timely patch deployment once released; maintain close vendor communication for updates. 6. Employ endpoint detection and response (EDR) tools to detect unusual process executions or privilege escalations on affected appliances. 7. Conduct regular credential audits and enforce least privilege principles to reduce the risk of credential compromise enabling exploitation. 8. Consider network-level protections such as Web Application Firewalls (WAF) or Intrusion Prevention Systems (IPS) with custom rules targeting suspicious upload requests.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.587Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691df24bcb9b476b7d51eb13

Added to database: 11/19/2025, 4:37:31 PM

Last enriched: 11/26/2025, 4:56:28 PM

Last updated: 1/8/2026, 11:36:37 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats