Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67513: CWE-521: Weak Password Requirements in FreePBX security-reporting

0
Medium
VulnerabilityCVE-2025-67513cvecve-2025-67513cwe-521
Published: Wed Dec 10 2025 (12/10/2025, 22:43:06 UTC)
Source: CVE Database V5
Vendor/Project: FreePBX
Product: security-reporting

Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.

AI-Powered Analysis

AILast updated: 12/10/2025, 23:01:32 UTC

Technical Analysis

CVE-2025-67513 identifies a weakness in the FreePBX Endpoint Manager module's password policy, specifically the app_password parameter, which defaults to a 6-digit numeric password in versions prior to 16.0.96 and between 17.0.1 and 17.0.9. This password is used for administrative access to telephony endpoints, including extensions, voicemail, user manager, DPMA, or EPM phone admin functions. Because the password is short and numeric, it is susceptible to brute force attacks without requiring any authentication or user interaction. The vulnerability allows an attacker with network access to repeatedly attempt password guesses until successful, potentially gaining control over telephony endpoints. Such control can lead to unauthorized call monitoring, call manipulation, or denial of telephony services. The vulnerability is rated with a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, no privileges or user interaction required, and low complexity. No known exploits are currently reported in the wild. The issue is resolved in FreePBX versions 16.0.96 and 17.0.10, where stronger password policies or randomized defaults are presumably enforced.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of telephony communications. Compromise of telephony endpoints can lead to eavesdropping on sensitive conversations, unauthorized call forwarding or toll fraud, and disruption of business communications. Organizations relying on FreePBX for internal or customer-facing telephony services may experience operational disruptions or reputational damage if exploited. Given the widespread use of FreePBX in small to medium enterprises and call centers across Europe, especially in sectors like finance, healthcare, and government, the impact could be substantial. Additionally, telephony systems often integrate with other IT infrastructure, so compromise could serve as a pivot point for broader network intrusion. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation if systems remain unpatched.

Mitigation Recommendations

European organizations should immediately verify their FreePBX Endpoint Manager versions and upgrade to 16.0.96 or 17.0.10 or later to remediate the vulnerability. Where immediate patching is not feasible, administrators should manually change default passwords to strong, complex values exceeding six digits and including alphanumeric and special characters. Implement network-level protections such as IP whitelisting or VPN access to restrict management interface exposure. Employ rate limiting and account lockout mechanisms to prevent brute force attempts. Regularly audit telephony system logs for suspicious login attempts or anomalies. Additionally, segment telephony infrastructure from general IT networks to limit lateral movement. Educate staff on the risks of weak telephony credentials and enforce strong password policies across all telephony-related accounts. Finally, monitor vendor advisories for any emerging exploit reports or additional patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-08T21:46:24.993Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939f84c7cb4621ebe960e97

Added to database: 12/10/2025, 10:46:36 PM

Last enriched: 12/10/2025, 11:01:32 PM

Last updated: 12/11/2025, 12:59:45 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats