CVE-2015-4719

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to bypass authentication in Pexip Infinity's client API and gain elevated privileges. It affects all Pexip Infinity deployments running versions before 10. Attackers can exploit this without valid credentials.

💻 Affected Systems

Products:
  • Pexip Infinity
Versions: All versions before 10
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the client API enabled are vulnerable. The vulnerability is in the authentication mechanism itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative control over the Pexip Infinity platform, potentially accessing sensitive meeting data, manipulating configurations, or using the system as a foothold for further network attacks.

🟠

Likely Case

Attackers gain unauthorized access to video conferencing sessions, administrative functions, or sensitive configuration data, potentially disrupting business communications or exfiltrating confidential meeting information.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the Pexip Infinity system itself, though authentication bypass still allows unauthorized access to the platform's functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows privilege escalation through crafted requests, suggesting relatively straightforward exploitation once the technique is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 10 or later

Vendor Advisory: https://docs.pexip.com/admin/security_bulletins.htm

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Upgrade to Pexip Infinity version 10 or later. 3. Restart the Pexip Infinity services. 4. Verify the upgrade was successful.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to the Pexip Infinity client API to trusted IP addresses only

API Disablement

all

Disable the client API if not required for your deployment

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Pexip Infinity from untrusted networks
  • Deploy a web application firewall (WAF) with rules to detect and block authentication bypass attempts

🔍 How to Verify

Check if Vulnerable:

Check Pexip Infinity version via administrative interface or command line. If version is below 10, the system is vulnerable.

Check Version:

pexadmin --version or check in the web administrative interface

Verify Fix Applied:

After upgrading, verify the version is 10 or higher and test authentication functionality.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful privileged access
  • Unusual API requests with crafted authentication parameters
  • Access from unexpected IP addresses to administrative endpoints

Network Indicators:

  • Unusual API traffic patterns to authentication endpoints
  • Requests bypassing normal authentication flows

SIEM Query:

source="pexip" AND (event_type="auth_failure" OR event_type="admin_access") | stats count by src_ip, user

🔗 References

📤 Share & Export