CVE-2025-1131
A local privilege escalation vulnerability exists in the safe_asterisk script included with the Asterisk toolkit package. When Asterisk is started via this script (common in SysV init or FreePBX environments), it sources all .sh files located in /etc/asterisk/startup.d/ as root, without validating ownership or permissions.
Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.
Non-root users with legitimate write access to /etc/asterisk can exploit this behaviour by placing malicious scripts in the startup.d directory, which will then execute with root privileges upon service restart.
Vendor
Product
CWE
Yayın Tarihi
2025-09-23 05:15:35
Güncelleme
2025-11-03 18:15:48
Source Identifier
b7efe717-a805-47cf-8e9a-921fca0ce0ce
KEV Date Added
-