900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
好的,我需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得通读整篇文章,抓住关键信息。 文章主要讲的是Sangoma FreePBX的漏洞被利用的情况。超过900个实例被感染,美国占了401个,其他国家也有分布。漏洞是CVE-2025-64328,CVSS评分8.6,属于高危。攻击者通过这个漏洞注入命令,获取远程访问权限。 漏洞影响FreePBX 17.0.2.36及以上版本,已在17.0.3修复。建议措施包括限制访问、更新模块等。CISA已将其加入已知漏洞目录, Fortinet也报告了相关活动。 总结时要包括:900多个实例被感染、漏洞CVE-2025-64328、影响版本、修复版本、建议措施以及CISA的行动。 现在把这些信息浓缩到100字以内,确保关键点都涵盖进去。 </think> 超900个Sangoma FreePBX实例仍受网络攻击影响,利用CVE-2025-64328漏洞植入web shell,主要分布在美国、巴西等国。该漏洞允许攻击者通过管理面板执行任意命令,影响FreePBX 17.0.2.36及以上版本,已修复于17.0.3。建议更新系统并加强访问控制以应对威胁。 2026-2-27 17:59:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Network Security / Vulnerability

The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that exploited a command injection vulnerability starting in December 2025.

Of these, 401 instances are located in the U.S., followed by 51 in Brazil, 43 in Canada, 40 in Germany, and 36 in France.

The non-profit entity said the compromises are likely accomplished via the exploitation of CVE-2025-64328 (CVSS score: 8.6), a high-severity security flaw that could enable post-authentication command injection.

"The impact is that any user with access to the FreePBX Administration panel could leverage this vulnerability to execute arbitrary shell commands on the underlying host," FreePBX said in an advisory for the flaw in November 2025. "An attacker could leverage this to obtain remote access to the system as the asterisk user."

The vulnerability affects FreePBX versions higher than and including 17.0.2.36. It was resolved in version 17.0.3. As mitigations, it's advised to add security controls to ensure that only authorized users have access to the FreePBX Administrator Control Panel (ACP), restrict access from hostile networks to the ACP, and update the filestore module to the latest version.

The vulnerability has since come under active exploitation in the wild, prompting the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add it to its Known Exploited Vulnerabilities (KEV) catalog earlier this month.

Source: The Shadowserver Foundation

In a report published late last month, Fortinet FortiGuard Labs revealed that the threat actor behind the cyber fraud operation codenamed INJ3CTOR3 has been exploiting CVE-2025-64328 starting early December 2025 to deliver a web shell codenamed EncystPHP.

"By leveraging Elastix and FreePBX administrative contexts, the web shell operates with elevated privileges, enabling arbitrary command execution on the compromised host and initiating outbound call activity through the PBX environment," the cybersecurity company noted.

FreePBX users are recommended to update their FreePBX deployments to the latest version as soon as possible to counter active threats.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/900-sangoma-freepbx-instances.html
如有侵权请联系:admin#unsafe.sh