2026-02-03 — Sangoma FreePBX Endpoint Manager OS command injection (CVE-2025-64328)¶
Signal: Added to CISA KEV on 2026-02-03.
Impact (per CISA): Post-authentication OS command injection in FreePBX Endpoint Manager (testconnection → check_ssh_connect()), potentially enabling remote access as the asterisk user.
Vendor/Product: Sangoma FreePBX (Endpoint Manager)
Why this matters¶
FreePBX is commonly deployed in sensitive environments (telephony/VoIP) and often ends up: - reachable from broad networks - integrated with other business systems
KEV status means exploitation is active; treat exposed/admin-accessible deployments as urgent.
Triage (15–30 minutes)¶
- Find instances
-
Inventory FreePBX systems and identify whether Endpoint Manager is installed/enabled.
-
Confirm exposure / access paths
- Is the admin interface reachable from the internet or untrusted networks?
-
Identify who has credentials / access to the affected functionality.
-
Preserve evidence (if you can do it without delaying patching)
- Capture web server logs, FreePBX logs, auth logs, and process history.
Mitigation (do now)¶
- Apply vendor mitigations/patches
-
Follow Sangoma/FreePBX guidance associated with CVE-2025-64328.
-
Restrict admin access
- Lock down admin UI to VPN/allowlists.
-
Enforce MFA where available.
-
Reduce blast radius
- Ensure services run with least privilege.
-
Limit outbound network access from the FreePBX host.
-
Credential hygiene
- Rotate admin passwords and any SIP/provider/API credentials stored on the system.
Hunt / detection ideas¶
Look for indicators consistent with command injection: - Unusual parameters hitting Endpoint Manager testconnection routes - Unexpected child processes spawned by the web/PHP context - Outbound connections from the FreePBX host to unfamiliar IPs - New files dropped in writable web directories, cron jobs, or startup scripts
References¶
- CISA KEV feed entry:
- https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json
- GitHub advisory referenced by CISA:
- https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw
- NVD:
- https://nvd.nist.gov/vuln/detail/CVE-2025-64328