CVE-2025-1131

A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions.


Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
GridwareCNA
---
---
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 10%
VendorProductVersion
sangomaasterisk
𝑥
< 18.26.3
sangomaasterisk
20.0.0 ≤
𝑥
< 20.15.1
sangomaasterisk
21.0.0 ≤
𝑥
< 21.10.1
sangomaasterisk
22.0.0 ≤
𝑥
< 22.5.1
sangomacertified_asterisk
18.9:cert1
sangomacertified_asterisk
18.9:cert1-rc1
sangomacertified_asterisk
18.9:cert10
sangomacertified_asterisk
18.9:cert11
sangomacertified_asterisk
18.9:cert12
sangomacertified_asterisk
18.9:cert13
sangomacertified_asterisk
18.9:cert14
sangomacertified_asterisk
18.9:cert15
sangomacertified_asterisk
18.9:cert2
sangomacertified_asterisk
18.9:cert3
sangomacertified_asterisk
18.9:cert4
sangomacertified_asterisk
18.9:cert5
sangomacertified_asterisk
18.9:cert6
sangomacertified_asterisk
18.9:cert7
sangomacertified_asterisk
18.9:cert8
sangomacertified_asterisk
18.9:cert8-rc1
sangomacertified_asterisk
18.9:cert8-rc2
sangomacertified_asterisk
18.9:cert9
sangomacertified_asterisk
20.7:cert1
sangomacertified_asterisk
20.7:cert1-rc1
sangomacertified_asterisk
20.7:cert1-rc2
sangomacertified_asterisk
20.7:cert2
sangomacertified_asterisk
20.7:cert3
sangomacertified_asterisk
20.7:cert4
sangomacertified_asterisk
20.7:cert5
sangomacertified_asterisk
20.7:cert6
𝑥
= Vulnerable software versions