Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers

Posted on September 2, 2025September 2, 2025 By CWS

Sangoma has launched emergency patches for a zero-day vulnerability exploited to hack FreePBX servers with the administrator management panel accessible from the web.

Tracked as CVE-2025-57819 (CVSS rating of 10/10), the bug is described as an inadequate sanitization of user-supplied information. Profitable exploitation of the flaw permits attackers to entry the FreePBX administrator panel, enabling database manipulation and distant code execution (RCE).

Fixes have been rolled out for FreePBX variations 15, 16, and 17, after Sangoma found that the safety defect had been exploited within the wild beginning on or earlier than August 21. The hacked servers had insufficient IP filtering/ACLs, as famous in a GitHub advisory.

“This preliminary entry level was then chained with a number of different steps to in the end achieve probably root degree entry on the goal programs,” the advisory reads.

The problem was found within the business “endpoint” module. Customers are suggested to lock down all administrator entry, distant web entry to the FreePBX servers, make sure the servers are protected by a firewall, replace to a patched model, and test that the “endpoint” has the really helpful fixes.

“Customers ought to test their automated safety updates are lively. We’re conscious of a present problem within the v17 “framework” module which will forestall automated replace notification emails,” Sangoma notes.

Sangoma has launched indicators-of-compromise (IOCs) to assist directors hunt for indicators of exploitation, in addition to really helpful restoration steps.

On Friday, the US cybersecurity company CISA added CVE-2025-57819 to its Identified Exploited Vulnerabilities (KEV) catalog, urging federal companies to patch it by September 19, as mandated by Binding Operational Directive (BOD) 22-01.Commercial. Scroll to proceed studying.

Though BOD 22-01 solely applies to federal companies, all organizations are suggested to evaluation CISA’s KEV checklist and take the required steps to mitigate the safety defects it identifies.

Sangoma FreePBX is an open supply interface for the administration of Asterisk, a framework for real-time, multi-protocol communications purposes.

Associated: WhatsApp Zero-Day Exploited in Assaults Concentrating on Apple Customers

Associated: Citrix Patches Exploited NetScaler Zero-Day

Associated: Organizations Warned of Exploited Git Vulnerability

Associated:Lots of of N-able N-central Situations Affected by Exploited Vulnerabilities

Security Week News Tags:Critical, Exploited, FreePBX, Hack, Patches, Sangoma, Servers, ZeroDay

Post navigation

Previous Post: How IOC Feeds Streamline Response and Threat Hunting for Best SOC Teams 
Next Post: Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Related Posts

Threat Actor Infests Hotels With New RAT Security Week News
Alleged Chinese State Hacker Wanted by US Arrested in Italy Security Week News
Ransomware Payments Dropped in Q3 2025: Analysis Security Week News
Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware Security Week News
Agentic Security Firm 7AI Raises $130 Million Security Week News
Victoria’s Secret Says It Will Postpone Earnings Report After Recent Security Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark