Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67513: CWE-521: Weak Password Requirements in FreePBX security-reporting

0
Medium
VulnerabilityCVE-2025-67513cvecve-2025-67513cwe-521
Published: Wed Dec 10 2025 (12/10/2025, 22:43:06 UTC)
Source: CVE Database V5
Vendor/Project: FreePBX
Product: security-reporting

Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.

AI-Powered Analysis

AILast updated: 12/17/2025, 23:13:41 UTC

Technical Analysis

CVE-2025-67513 identifies a weakness in the FreePBX Endpoint Manager module, specifically in versions prior to 16.0.96 and between 17.0.1 and 17.0.9, where the default password (app_password) is a six-digit numeric string. This weak password is used by default for various telephony-related administrative functions including extensions, voicemail, user manager, DPMA, or EPM phone admin accounts. Because the password space is limited to 1 million possible combinations and no account lockout or rate limiting is indicated, an attacker can perform a brute force attack remotely over the network without requiring any authentication or user interaction. Successful exploitation could allow attackers to gain unauthorized access to telephony endpoints and administrative functions, potentially enabling call interception, voicemail compromise, or configuration changes. The vulnerability is classified under CWE-521 (Weak Password Requirements) and has a CVSS 4.0 score of 6.9, indicating a medium severity level. No known exploits are currently reported in the wild. The issue is resolved in FreePBX versions 16.0.96 and 17.0.10, where stronger password policies or randomized passwords are presumably enforced.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of telephony communications and administrative controls. Compromise of telephony endpoints could lead to unauthorized call monitoring, toll fraud, voicemail access, or disruption of phone services. Organizations relying on FreePBX for critical communications, especially in sectors such as finance, healthcare, or government, could face operational disruptions and data leakage. The ease of remote exploitation without authentication increases the threat surface, particularly for organizations exposing FreePBX management interfaces to the internet or poorly segmented internal networks. While availability impact is limited, the potential for unauthorized access to sensitive telephony functions can have significant reputational and compliance consequences under regulations like GDPR.

Mitigation Recommendations

European organizations should immediately verify their FreePBX Endpoint Manager versions and upgrade to 16.0.96 or 17.0.10 or later to remediate the vulnerability. In addition to patching, administrators should enforce strong password policies that require complex, non-numeric passwords for all telephony-related accounts. Network-level protections such as IP whitelisting, VPN access for management interfaces, and rate limiting or account lockout mechanisms should be implemented to reduce brute force attack feasibility. Regular audits of telephony configurations and logs can help detect suspicious access attempts. Organizations should also consider segmenting telephony management interfaces from general user networks and restricting access to trusted personnel only. Monitoring for unusual call patterns or configuration changes can provide early warning of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-08T21:46:24.993Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939f84c7cb4621ebe960e97

Added to database: 12/10/2025, 10:46:36 PM

Last enriched: 12/17/2025, 11:13:41 PM

Last updated: 2/6/2026, 10:40:48 AM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats