Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers

Posted on September 2, 2025September 2, 2025 By CWS

Sangoma has launched emergency patches for a zero-day vulnerability exploited to hack FreePBX servers with the administrator management panel accessible from the web.

Tracked as CVE-2025-57819 (CVSS rating of 10/10), the bug is described as an inadequate sanitization of user-supplied information. Profitable exploitation of the flaw permits attackers to entry the FreePBX administrator panel, enabling database manipulation and distant code execution (RCE).

Fixes have been rolled out for FreePBX variations 15, 16, and 17, after Sangoma found that the safety defect had been exploited within the wild beginning on or earlier than August 21. The hacked servers had insufficient IP filtering/ACLs, as famous in a GitHub advisory.

“This preliminary entry level was then chained with a number of different steps to in the end achieve probably root degree entry on the goal programs,” the advisory reads.

The problem was found within the business “endpoint” module. Customers are suggested to lock down all administrator entry, distant web entry to the FreePBX servers, make sure the servers are protected by a firewall, replace to a patched model, and test that the “endpoint” has the really helpful fixes.

“Customers ought to test their automated safety updates are lively. We’re conscious of a present problem within the v17 “framework” module which will forestall automated replace notification emails,” Sangoma notes.

Sangoma has launched indicators-of-compromise (IOCs) to assist directors hunt for indicators of exploitation, in addition to really helpful restoration steps.

On Friday, the US cybersecurity company CISA added CVE-2025-57819 to its Identified Exploited Vulnerabilities (KEV) catalog, urging federal companies to patch it by September 19, as mandated by Binding Operational Directive (BOD) 22-01.Commercial. Scroll to proceed studying.

Though BOD 22-01 solely applies to federal companies, all organizations are suggested to evaluation CISA’s KEV checklist and take the required steps to mitigate the safety defects it identifies.

Sangoma FreePBX is an open supply interface for the administration of Asterisk, a framework for real-time, multi-protocol communications purposes.

Associated: WhatsApp Zero-Day Exploited in Assaults Concentrating on Apple Customers

Associated: Citrix Patches Exploited NetScaler Zero-Day

Associated: Organizations Warned of Exploited Git Vulnerability

Associated:Lots of of N-able N-central Situations Affected by Exploited Vulnerabilities

Security Week News Tags:Critical, Exploited, FreePBX, Hack, Patches, Sangoma, Servers, ZeroDay

Post navigation

Previous Post: How IOC Feeds Streamline Response and Threat Hunting for Best SOC Teams 
Next Post: Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Related Posts

Gabbard Says UK Scraps Demand for Apple to Give Backdoor Access to Data Security Week News
Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying  Security Week News
Possible Zero-Day Patched in SonicWall SMA Appliances Security Week News
Google Warns UK Retailer Hackers Now Targeting US Security Week News
CISA Releases Guidance on SIEM and SOAR Implementation Security Week News
160,000 Impacted by Valsoft Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use a Secure File Sharing Platform
  • ESPHome Web Server Authentication Bypass Vulnerability Exposes Smart Devices
  • Google Confirms That Claims of Major Gmail Security Warning are False
  • New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
  • Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use a Secure File Sharing Platform
  • ESPHome Web Server Authentication Bypass Vulnerability Exposes Smart Devices
  • Google Confirms That Claims of Major Gmail Security Warning are False
  • New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains
  • Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News