A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions.
Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.
CVSS
No CVSS.
References
Configurations
No configuration.
History
23 Sep 2025, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-23 05:15
Updated : 2025-09-24 18:11
NVD link : CVE-2025-1131
Mitre link : CVE-2025-1131
CVE.ORG link : CVE-2025-1131
JSON object : View
Products Affected
No product.
CWE
CWE-427
Uncontrolled Search Path Element