Vulnerability Details CVE-2018-12227
An issue was discovered in Asterisk Open Source 13.x before 13.21.1, 14.x before 14.7.7, and 15.x before 15.4.1 and Certified Asterisk 13.18-cert before 13.18-cert4 and 13.21-cert before 13.21-cert2. When endpoint specific ACL rules block a SIP request, they respond with a 403 forbidden. However, if an endpoint is not identified, then a 401 unauthorized response is sent. This vulnerability just discloses which requests hit a defined endpoint. The ACL rules cannot be bypassed to gain access to the disclosed endpoints.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.011
EPSS Ranking 76.7%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2018-12227
-
cpe:2.3:a:digium:asterisk:13.0.0
-
cpe:2.3:a:digium:asterisk:13.0.1
-
cpe:2.3:a:digium:asterisk:13.0.2
-
cpe:2.3:a:digium:asterisk:13.1.0
-
cpe:2.3:a:digium:asterisk:13.1.1
-
cpe:2.3:a:digium:asterisk:13.10.0
-
cpe:2.3:a:digium:asterisk:13.11.0
-
cpe:2.3:a:digium:asterisk:13.11.1
-
cpe:2.3:a:digium:asterisk:13.11.2
-
cpe:2.3:a:digium:asterisk:13.12
-
cpe:2.3:a:digium:asterisk:13.12.0
-
cpe:2.3:a:digium:asterisk:13.12.1
-
cpe:2.3:a:digium:asterisk:13.12.2
-
cpe:2.3:a:digium:asterisk:13.13
-
cpe:2.3:a:digium:asterisk:13.13.0
-
cpe:2.3:a:digium:asterisk:13.13.1
-
cpe:2.3:a:digium:asterisk:13.14.0
-
cpe:2.3:a:digium:asterisk:13.14.1
-
cpe:2.3:a:digium:asterisk:13.15.0
-
cpe:2.3:a:digium:asterisk:13.15.1
-
cpe:2.3:a:digium:asterisk:13.16.0
-
cpe:2.3:a:digium:asterisk:13.17.0
-
cpe:2.3:a:digium:asterisk:13.17.1
-
cpe:2.3:a:digium:asterisk:13.17.2
-
cpe:2.3:a:digium:asterisk:13.18.0
-
cpe:2.3:a:digium:asterisk:13.18.1
-
cpe:2.3:a:digium:asterisk:13.18.2
-
cpe:2.3:a:digium:asterisk:13.18.3
-
cpe:2.3:a:digium:asterisk:13.18.4
-
cpe:2.3:a:digium:asterisk:13.18.5
-
cpe:2.3:a:digium:asterisk:13.19.0
-
cpe:2.3:a:digium:asterisk:13.19.1
-
cpe:2.3:a:digium:asterisk:13.19.2
-
cpe:2.3:a:digium:asterisk:13.2.0
-
cpe:2.3:a:digium:asterisk:13.2.1
-
cpe:2.3:a:digium:asterisk:13.20.0
-
cpe:2.3:a:digium:asterisk:13.21.0
-
cpe:2.3:a:digium:asterisk:13.3.0
-
cpe:2.3:a:digium:asterisk:13.3.1
-
cpe:2.3:a:digium:asterisk:13.3.2
-
cpe:2.3:a:digium:asterisk:13.4.0
-
cpe:2.3:a:digium:asterisk:13.5.0
-
cpe:2.3:a:digium:asterisk:13.6.0
-
cpe:2.3:a:digium:asterisk:13.7.0
-
cpe:2.3:a:digium:asterisk:13.7.1
-
cpe:2.3:a:digium:asterisk:13.7.2
-
cpe:2.3:a:digium:asterisk:13.8.0
-
cpe:2.3:a:digium:asterisk:13.8.1
-
cpe:2.3:a:digium:asterisk:13.8.2
-
cpe:2.3:a:digium:asterisk:13.9.0
-
cpe:2.3:a:digium:asterisk:13.9.1
-
cpe:2.3:a:digium:asterisk:14.0.1
-
cpe:2.3:a:digium:asterisk:14.0.2
-
cpe:2.3:a:digium:asterisk:14.01
-
cpe:2.3:a:digium:asterisk:14.02
-
cpe:2.3:a:digium:asterisk:14.1
-
cpe:2.3:a:digium:asterisk:14.1.0
-
cpe:2.3:a:digium:asterisk:14.1.1
-
cpe:2.3:a:digium:asterisk:14.1.2
-
cpe:2.3:a:digium:asterisk:14.2
-
cpe:2.3:a:digium:asterisk:14.2.0
-
cpe:2.3:a:digium:asterisk:14.2.1
-
cpe:2.3:a:digium:asterisk:14.3.0
-
cpe:2.3:a:digium:asterisk:14.3.1
-
cpe:2.3:a:digium:asterisk:14.4.0
-
cpe:2.3:a:digium:asterisk:14.4.1
-
cpe:2.3:a:digium:asterisk:14.5.0
-
cpe:2.3:a:digium:asterisk:14.6.0
-
cpe:2.3:a:digium:asterisk:14.6.1
-
cpe:2.3:a:digium:asterisk:14.6.2
-
cpe:2.3:a:digium:asterisk:14.7.0
-
cpe:2.3:a:digium:asterisk:14.7.1
-
cpe:2.3:a:digium:asterisk:14.7.2
-
cpe:2.3:a:digium:asterisk:14.7.3
-
cpe:2.3:a:digium:asterisk:14.7.4
-
cpe:2.3:a:digium:asterisk:14.7.5
-
cpe:2.3:a:digium:asterisk:14.7.6
-
cpe:2.3:a:digium:asterisk:15.0.0
-
cpe:2.3:a:digium:asterisk:15.1.0
-
cpe:2.3:a:digium:asterisk:15.1.1
-
cpe:2.3:a:digium:asterisk:15.1.2
-
cpe:2.3:a:digium:asterisk:15.1.3
-
cpe:2.3:a:digium:asterisk:15.1.4
-
cpe:2.3:a:digium:asterisk:15.1.5
-
cpe:2.3:a:digium:asterisk:15.2.0
-
cpe:2.3:a:digium:asterisk:15.2.1
-
cpe:2.3:a:digium:asterisk:15.2.2
-
cpe:2.3:a:digium:asterisk:15.3.0
-
cpe:2.3:a:digium:asterisk:15.4.0
-
cpe:2.3:a:digium:certified_asterisk:13.18
-
cpe:2.3:a:digium:certified_asterisk:13.21
-
cpe:2.3:o:debian:debian_linux:9.0