Browse all 5 CVE security advisories affecting freeswitch. AI-powered Chinese analysis, POCs, and references for each vulnerability.
FreeSwitch serves as an open-source communications platform primarily used for building PBX systems, VoIP gateways, and other telephony applications. Historically, it has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues, as evidenced by its five recorded CVEs. The platform's modular architecture and extensive API exposure have contributed to security challenges, with past incidents including unauthorized access through default credentials and insecure endpoints. While FreeSwitch offers flexibility for custom deployments, its security track record highlights the importance of proper configuration, timely patching, and network segmentation to mitigate risks in production environments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-32307 | heap-over-flow and integer-overflow in sofia-sip — sofia-sipCWE-190 | 7.5 | High | 2023-05-26 |
| CVE-2023-22741 | heap-over-flow in stun_parse_attribute in sofia-sip — sofia-sipCWE-120 | 9.8 | Critical | 2023-01-19 |
| CVE-2022-31001 | Out-of-bounds Read in Sofia-SIP — sofia-sipCWE-125 | 7.5 | High | 2022-05-31 |
| CVE-2022-31002 | Out-of-bounds Read in Sofia-SIP — sofia-sipCWE-125 | 7.5 | High | 2022-05-31 |
| CVE-2022-31003 | Heap-based Buffer Overflow and Out-of-bounds Write in Sofia-SIP — sofia-sipCWE-122 | 9.1 | Critical | 2022-05-31 |
This page lists every published CVE security advisory associated with freeswitch. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.