This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Critical SQL Injection in FreePBX `userman` endpoints. π₯ **Consequences**: Unauthenticated access to Admin Panel β‘οΈ Remote Code Execution (RCE). Systems compromised since Aug 2025.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: CWE-89 (SQL Injection). β **Flaw**: Insufficient user data sanitization in the `userman` AJAX endpoints. Allows attackers to inject malicious SQL commands.
π **Privileges**: Full Admin Access without login. π» **Data/Action**: Remote Code Execution (RCE). Attackers can take over the entire PBX system and execute arbitrary commands.
Q5Is exploitation threshold high? (Auth/Config)
π **Auth**: **Unauthenticated**. No login required. π **Config**: If the Admin Control Panel is publicly accessible, exploitation is trivial. High risk if exposed to internet.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π£ **Exploit**: **Yes**, Public PoC available. π GitHub repos (rxerium, blueisbeautiful, ImBIOS) provide detection scripts and SQLi exploits. Wild exploitation confirmed.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Use Sucuri Labs `ioc-check` script. π³ **Lab**: Spin up Docker container (ImBIOS) to test. π‘ **Scan**: Look for time-based SQLi in `userman` endpoints using Nuclei templates.
Q8Is it fixed officially? (Patch/Mitigation)
π§ **Fix**: Official patches released by Sangoma. π₯ **Action**: Upgrade Endpoint Manager module to >= 15.0.66, >= 16.0.89, or >= 17.0.3 immediately.
Q9What if no patch? (Workaround)
π§ **Workaround**: Restrict public access to Administrator Control Panel via Firewall/WAF. π Block external IPs from reaching FreePBX admin interfaces until patched.
Q10Is it urgent? (Priority Suggestion)
π₯ **Priority**: **CRITICAL / URGENT**. Active exploitation detected. Immediate patching or network isolation required to prevent total system compromise.