CVE-2020-11805

9.8 CRITICAL

📋 TL;DR

CVE-2020-11805 is an incorrect UDP access control vulnerability in Pexip Reverse Proxy and TURN Server that allows unauthorized users to relay traffic through the TURN server. This affects organizations using Pexip's video conferencing infrastructure before version 6.1.0, potentially enabling attackers to bypass network security controls.

💻 Affected Systems

Products:
  • Pexip Reverse Proxy
  • Pexip TURN Server
Versions: All versions before 6.1.0
Operating Systems: Linux-based systems running Pexip software
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with TURN server functionality enabled and accessible to untrusted networks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could use the vulnerable TURN server as an open proxy to launch attacks against internal systems, bypass firewall rules, and exfiltrate data while appearing to originate from the Pexip server.

🟠

Likely Case

Unauthorized external actors could relay malicious traffic through the TURN server to target internal systems, potentially enabling lateral movement within the network.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to potential resource exhaustion of the TURN server.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the TURN server but no authentication, making it relatively simple to abuse.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.1.0 and later

Vendor Advisory: https://docs.pexip.com/admin/security_bulletins.htm

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Upgrade to Pexip version 6.1.0 or later. 3. Restart Pexip services. 4. Verify TURN server functionality.

🔧 Temporary Workarounds

Network Isolation

linux

Restrict network access to TURN server ports (typically UDP 3478 and 5349) to trusted sources only.

iptables -A INPUT -p udp --dport 3478 -s trusted_network -j ACCEPT
iptables -A INPUT -p udp --dport 3478 -j DROP
iptables -A INPUT -p udp --dport 5349 -s trusted_network -j ACCEPT
iptables -A INPUT -p udp --dport 5349 -j DROP

Disable TURN Server

linux

Temporarily disable TURN server functionality if not required for operations.

pexipctl turn disable

🧯 If You Can't Patch

  • Implement strict network access controls to limit TURN server access to authorized clients only.
  • Monitor TURN server logs for unusual relay activity and implement rate limiting.

🔍 How to Verify

Check if Vulnerable:

Check Pexip version: if version is below 6.1.0 and TURN server is enabled, the system is vulnerable.

Check Version:

pexip --version

Verify Fix Applied:

Verify version is 6.1.0 or higher and test TURN server functionality with authorized clients only.

📡 Detection & Monitoring

Log Indicators:

  • Unusual TURN allocation requests from unexpected IP addresses
  • High volume of TURN relay traffic from single sources

Network Indicators:

  • UDP traffic on port 3478/5349 from external IPs to internal networks
  • TURN server acting as relay for non-video conferencing traffic

SIEM Query:

source="pexip_turn.log" AND (event="allocation" OR event="relay") AND NOT src_ip IN (trusted_ips)

🔗 References

📤 Share & Export