Home

Description

AudioCodes Fax Server and Auto-Attendant IVR appliances versions up to and including 2.6.23 contain an unauthenticated file read vulnerability via the download.php script. The endpoint exposes a file download mechanism that lacks access control, allowing remote, unauthenticated users to request files stored on the appliance based solely on attacker-supplied path and filename parameters. While limited to specific file extensions permitted by the application logic, sensitive backup archives can be retrieved, exposing internal databases and credential hashes. Successful exploitation may lead to disclosure of administrative password hashes and other sensitive configuration data.

PUBLISHED Reserved 2025-04-15 | Published 2025-11-19 | Updated 2025-11-20 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N

Problem types

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unknown

Any version
affected

Credits

Pierre Barre finder

References

www.audiocodes.com/...ocodes-auto-attendant-ivr-solution.pdf vendor-advisory patch mitigation

pierrekim.github.io/...ocodes-fax-ivr-8-vulnerabilities.html technical-description exploit

pierrekim.github.io/advisories/2025-audiocodes-fax-ivr.txt technical-description exploit

www.vulncheck.com/...-unauthenticated-file-read-via-download third-party-advisory

cve.org (CVE-2025-34331)

nvd.nist.gov (CVE-2025-34331)

Download JSON