2026-02-03 — Sangoma FreePBX Remote Admin authentication bypass (CVE-2019-19006)¶
Signal: Added to CISA KEV on 2026-02-03.
Impact (per CISA): Improper authentication that can potentially allow unauthorized users to bypass password authentication and access services provided by the FreePBX admin.
Vendor/Product: Sangoma FreePBX
Why this matters¶
An admin auth bypass in a telephony management platform can rapidly become full compromise: - call routing manipulation / toll fraud - credential theft (SIP trunks, provider accounts) - lateral movement via the host
KEV status implies exploitation is known and active.
Triage (15–30 minutes)¶
- Confirm exposure
-
Determine whether FreePBX admin endpoints are reachable from the internet or untrusted networks.
-
Check patch/mitigation status
-
Validate your deployed version against the vendor advisory for CVE-2019-19006.
-
Preserve logs
- Web server access logs, FreePBX admin/auth logs, and any reverse proxy/WAF logs.
Mitigation (do now)¶
- Apply vendor mitigations/patches
-
Follow FreePBX’s advisory guidance.
-
Access control hardening
- Restrict admin UI to VPN/allowlists.
- Enforce MFA where possible.
-
Ensure strong unique admin credentials.
-
Post-fix hardening
- Rotate admin credentials and any secrets stored in the system.
- Review admin user list and roles for unexpected changes.
Hunt / detection ideas¶
- Unexpected admin logins or sessions, especially from new IPs
- Requests to admin endpoints that succeed without expected authentication flow
- New/modified call routing, outbound dialing rules, or trunk configs
- Signs of toll fraud: unusual call volume, destination patterns, after-hours spikes
References¶
- CISA KEV feed entry:
- https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json
- FreePBX advisory referenced by CISA:
- https://wiki.freepbx.org/display/FOP/2019-11-20%2BRemote%2BAdmin%2BAuthentication%2BBypass
- NVD:
- https://nvd.nist.gov/vuln/detail/CVE-2019-19006