轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202512-00000008
[內容說明]
FreePBX是Sangoma旗下開源IP電話管理系統,包含管理網路電話、來電轉接、會議功能等。近期FreePBX發布重大資安公告,指出系統的模組FreePBX Endpoint Manager存在身分驗證錯誤漏洞(CVE-2025-66039,CVSS 4.x:9.3),若身份驗證類型設定為「webserver」時,該模組存在身分驗證繞過漏洞;若Authorization標頭的値為任意,無論憑證是否有效,都會把session導向目標使用者。
[影響平台]
● FreePBX 16.0.44版本(不含)之前版本
● FreePBX 17.0.23版本(不含)之前版本
[建議措施]
請更新至以下版本: FreePBX 16.0.44版本、 FreePBX 17.0.23版本
[參考資料]
https://www.twcert.org.tw/tw/cp-169-10582-80c21-1.html
Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202512-00000008
[Content Description]
FreePBX is an open-source IP telephony management system from Sangoma, including features such as VoIP management, call forwarding, and conferencing. Recently, FreePBX issued a major cybersecurity announcement, indicating that its FreePBX Endpoint Manager module contains an authentication error vulnerability (CVE-2025-66039, CVSS 4.x: 9.3). If the authentication type is set to "webserver," the module has an authentication bypass vulnerability; if the value of the Authorization header is arbitrary, regardless of the validity of the credentials, the session will be redirected to the target user.
[Affected Platforms]
● FreePBX versions prior to 16.0.44
● FreePBX versions prior to 17.0.23
[Recommended Actions]
Please update to the following versions: FreePBX 16.0.44, FreePBX 17.0.23
[Reference]
https://www.twcert.org.tw/tw/cp-169-10582-80c21-1.html