Asterisk CIDR Notation in Access Rule Remote Security Bypass Vulnerability

Summary
Asterisk is prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass access control list (ACL) rules, which may lead to other attacks.
Solution
Updates are available. Please see the references for details.
References