An issue was discovered in the 3CX Phone System Management Console prior to version 18 Update 3 FINAL. An unauthenticated attacker could abuse improperly secured access to arbitrary files on the server (via /Electron/download directory traversal in conjunction with a path component that uses backslash characters), leading to cleartext credential disclosure. Afterwards, the authenticated attacker is able to upload a file that overwrites a 3CX service binary, leading to Remote Code Execution as NT AUTHORITY\SYSTEM on Windows installations. NOTE: this issue exists because of an incomplete fix for CVE-2022-48482.
                
            References
                    | Link | Resource | 
|---|---|
| https://medium.com/%40frycos/pwning-3cx-phone-management-backends-from-the-internet-d0096339dd88 | |
| https://www.3cx.com/blog/change-log/phone-system-change-log/ | Release Notes Vendor Advisory | 
| https://www.3cx.com/blog/releases/v18-security-hotfix/ | Release Notes Vendor Advisory | 
| https://www.3cx.com/blog/releases/v18-update-3-final/ | Release Notes Vendor Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2022-05-06 15:15
Updated : 2023-11-07 03:45
NVD link : CVE-2022-28005
Mitre link : CVE-2022-28005
CVE.ORG link : CVE-2022-28005
JSON object : View
Products Affected
                3cx
- 3cx
CWE
                
                    
                        
                        CWE-522
                        
            Insufficiently Protected Credentials
