Cyber Posture

CVE-2024-57520

Critical

Published: 05 February 2025

Published
05 February 2025
Modified
06 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0352 87.7th percentile
Risk Priority 22 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-57520 is a critical-severity Incorrect Permission Assignment for Critical Resource (CWE-732) vulnerability in Sangoma Asterisk. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 12.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and CM-5 (Access Restrictions for Change).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Restricts access to configuration changes to authorized personnel only, directly mitigating exploitation of the action_createconfig function by limiting privileged user capabilities.

prevent

Enforces least privilege for users managing configurations, reducing the attack surface even for privileged accounts that could exploit insecure permissions.

prevent

Validates inputs to the action_createconfig function, addressing the directory traversal aspect by rejecting invalid paths outside the Asterisk directory.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote exploitation of public-facing Asterisk service via insecure permissions in config action, disputed between RCE and limited directory traversal.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Insecure Permissions vulnerability in asterisk v22 allows a remote attacker to execute arbitrary code via the action_createconfig function. NOTE: this is disputed by the Supplier because the impact is limited to creating empty files outside of the Asterisk product directory…

more

(aka directory traversal) and the attack can only be performed by a privileged user who has the ability to manage the configuration.

Deeper analysisAI

CVE-2024-57520 is an insecure permissions vulnerability (CWE-732) affecting Asterisk version 22, specifically in the action_createconfig function. The issue has been reported to enable a remote attacker to execute arbitrary code. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with network accessibility, low complexity, and no required privileges or user interaction.

The attack scenario involves a remote attacker exploiting the vulnerability remotely. According to the reporter, this allows arbitrary code execution, while the supplier disputes this, stating the impact is limited to directory traversal that creates empty files outside the Asterisk product directory. The supplier further notes that exploitation requires a privileged user with the ability to manage the configuration.

Advisories reference a GitHub issue (https://github.com/asterisk/asterisk/issues/1122) where the supplier disputes the severity and a Gist (https://gist.github.com/hyp164D1/ae76ab25acfbe263b2ed7b24b6e5c621) likely containing additional details or a proof-of-concept. No specific patches or mitigations are detailed in the provided information.

Details

CWE(s)

Affected Products

sangoma
asterisk
22.0.0 — 22.5.1

CVEs Like This One

CVE-2025-66039Same vendor: Sangoma
CVE-2026-28284Same vendor: Sangoma
CVE-2026-23740Same product: Sangoma Asterisk
CVE-2026-23741Same product: Sangoma Asterisk
CVE-2024-58294Same vendor: Sangoma
CVE-2026-28209Same vendor: Sangoma
CVE-2025-25373Shared CWE-732
CVE-2026-21902Shared CWE-732
CVE-2026-28210Same vendor: Sangoma
CVE-2025-57819Same vendor: Sangoma

References