Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers

Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers

Sangoma has released emergency patches for a critical zero-day vulnerability (CVE-2025-57819) in FreePBX, which has been actively exploited to gain remote access and manipulate databases. Organizations are advised to update immediately, implement strict access controls, and monitor for signs of compromise. #CVE202557819 #FreePBX #Sangoma #ZeroDayVulnerability

Keypoints

  • Sangoma released patches for a zero-day vulnerability in FreePBX that is being exploited in the wild.
  • The security flaw allows attackers to access the administrator panel, enabling remote code execution.
  • Exploitation was first observed on or before August 21, exploiting weak IP filtering and ACLs.
  • Users are strongly advised to update to patched versions, tighten access controls, and check for signs of compromise.
  • The US CISA added CVE-2025-57819 to its KEV list, urging federal agencies to patch by September 19.

Read More: https://www.securityweek.com/sangoma-patches-critical-zero-day-exploited-to-hack-freepbx-servers/