Vulnerability Details : CVE-2023-40018
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.10, FreeSWITCH allows remote users to trigger out of bounds write by offering an ICE candidate with unknown component ID. When an SDP is offered with any ICE candidates with an unknown component ID, FreeSWITCH will make an out of bounds write to its arrays. By abusing this vulnerability, an attacker is able to corrupt FreeSWITCH memory leading to an undefined behavior of the system or a crash of it. Version 1.10.10 contains a patch for this issue.
Vulnerability category: Memory Corruption
Products affected by CVE-2023-40018
- cpe:2.3:a:freeswitch:freeswitch:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-40018
0.15%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 51 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-40018
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2023-40018
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-40018
-
https://github.com/signalwire/freeswitch/security/advisories/GHSA-7mwp-86fv-hcg3
FreeSWITCH allows remote users to trigger out of bounds write by offering an ICE candidate with unknown component ID · Advisory · signalwire/freeswitch · GitHubVendor Advisory
-
https://github.com/signalwire/freeswitch/releases/tag/v1.10.10
Release FreeSWITCH v1.10.10 Release · signalwire/freeswitch · GitHubRelease Notes
Jump to