ID

VAR-202602-1715


CVE

CVE-2026-23739


TITLE

Sangoma of Asterisk In multiple products such as XML  External entity vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2026-004116

DESCRIPTION

Asterisk is an open source private branch exchange and telephony toolkit. Prior to versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2, the ast_xml_open() function in xml.c parses XML documents using libxml with unsafe parsing options that enable entity expansion and XInclude processing. Specifically, it invokes xmlReadFile() with the XML_PARSE_NOENT flag and later processes XIncludes via xmlXIncludeProcess().If any untrusted or user-supplied XML file is passed to this function, it can allow an attacker to trigger XML External Entity (XXE) or XInclude-based local file disclosure, potentially exposing sensitive files from the host system. This can also be triggered in other cases in which the user is able to supply input in xml format that triggers the asterisk process to parse it. This issue has been patched in versions 20.7-cert9, 20.18.2, 21.12.1, 22.8.2, and 23.2.2. 20.7-cert9 , 20.18.2 , 21.12.1 , 22.8.2 ,and 23.2.2 Fixed inAll information handled by the software may be leaked to the outside. In addition, information handled by the software will not be rewritten. Furthermore, the software will not stop. Furthermore, attacks exploiting this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2026-23739 // JVNDB: JVNDB-2026-004116

AFFECTED PRODUCTS

vendor:sangomamodel:asteriskscope:ltversion:23.2.2

Trust: 1.0

vendor:sangomamodel:certified asteriskscope:lteversion:18.9

Trust: 1.0

vendor:sangomamodel:asteriskscope:ltversion:21.12.1

Trust: 1.0

vendor:sangomamodel:asteriskscope:gteversion:21.0.0

Trust: 1.0

vendor:sangomamodel:asteriskscope:ltversion:20.18.2

Trust: 1.0

vendor:sangomamodel:asteriskscope:gteversion:23.0.0

Trust: 1.0

vendor:sangomamodel:asteriskscope:ltversion:22.8.2

Trust: 1.0

vendor:sangomamodel:certified asteriskscope:eqversion:20.7

Trust: 1.0

vendor:sangomamodel:asteriskscope:gteversion:22.0.0

Trust: 1.0

vendor:sangomamodel:certified asteriskscope: - version: -

Trust: 0.8

vendor:sangomamodel:asteriskscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-004116 // NVD: CVE-2026-23739

CVSS

SEVERITY

CVSSV2

CVSSV3

security-advisories@github.com: CVE-2026-23739
value: LOW

Trust: 1.0

nvd@nist.gov: CVE-2026-23739
value: MEDIUM

Trust: 1.0

NVD: CVE-2026-23739
value: MEDIUM

Trust: 0.8

security-advisories@github.com: CVE-2026-23739
baseSeverity: LOW
baseScore: 2.0
vectorString: CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: HIGH
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 0.5
impactScore: 1.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2026-23739
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2026-23739
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-004116 // NVD: CVE-2026-23739 // NVD: CVE-2026-23739

PROBLEMTYPE DATA

problemtype:CWE-611

Trust: 1.0

problemtype:XML Improper restriction of external entity references (CWE-611) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-004116 // NVD: CVE-2026-23739

PATCH

title:Asterisk xml.c uses unsafe XML_PARSE_NOENT leading to potential XXE Injection  Advisory  asterisk/asterisk  GitHuburl:https://github.com/asterisk/asterisk/security/advisories/GHSA-85x7-54wr-vh42

Trust: 0.8

sources: JVNDB: JVNDB-2026-004116

EXTERNAL IDS

db:NVDid:CVE-2026-23739

Trust: 2.6

db:JVNDBid:JVNDB-2026-004116

Trust: 0.8

sources: JVNDB: JVNDB-2026-004116 // NVD: CVE-2026-23739

REFERENCES

url:https://github.com/asterisk/asterisk/security/advisories/ghsa-85x7-54wr-vh42

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2026-23739

Trust: 0.8

sources: JVNDB: JVNDB-2026-004116 // NVD: CVE-2026-23739

SOURCES

db:JVNDBid:JVNDB-2026-004116
db:NVDid:CVE-2026-23739

LAST UPDATE DATE

2026-02-21T23:22:39.614000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-004116date:2026-02-20T02:20:00
db:NVDid:CVE-2026-23739date:2026-02-18T18:42:37.300

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-004116date:2026-02-20T00:00:00
db:NVDid:CVE-2026-23739date:2026-02-06T17:16:26.147