CVE-2020-13387
📋 TL;DR
Pexip Infinity video conferencing platforms before version 23.4 have insufficient input validation in H.323 protocol handling, allowing attackers to cause temporary denial of service. This affects all organizations running vulnerable versions of Pexip Infinity for video conferencing.
💻 Affected Systems
- Pexip Infinity
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could disrupt all video conferencing services by sending malformed H.323 packets, causing system instability and requiring manual intervention to restore service.
Likely Case
Temporary service disruption affecting video conferences, potentially causing meeting cancellations or interruptions until the system recovers automatically.
If Mitigated
Minimal impact with proper network segmentation and monitoring; system may experience brief performance degradation but maintains core functionality.
🎯 Exploit Status
Exploitation requires sending specially crafted H.323 packets to vulnerable endpoints; no authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 23.4 or later
Vendor Advisory: https://docs.pexip.com/admin/security_bulletins.htm
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download Pexip Infinity version 23.4 or later from Pexip support portal. 3. Apply the update following Pexip's upgrade documentation. 4. Restart the system. 5. Verify functionality post-upgrade.
🔧 Temporary Workarounds
Disable H.323 Protocol
allTemporarily disable H.323 protocol if not required for operations
pexip> configuration protocol h323 disable
Network Segmentation
allRestrict H.323 traffic to trusted sources only using firewall rules
🧯 If You Can't Patch
- Implement strict network ACLs to limit H.323 traffic to trusted IP addresses only
- Deploy network monitoring and intrusion detection for H.323 protocol anomalies
🔍 How to Verify
Check if Vulnerable:
Check Pexip Infinity version via web admin interface or CLI: pexip> show version
Check Version:
pexip> show version
Verify Fix Applied:
Confirm version is 23.4 or higher and test H.323 connectivity with valid traffic
📡 Detection & Monitoring
Log Indicators:
- Multiple H.323 connection failures
- System restart events
- High CPU/memory usage spikes
Network Indicators:
- Unusual H.323 packet patterns
- High volume of malformed H.323 packets
- Traffic from unexpected sources on H.323 ports (1720, 1719)
SIEM Query:
source="pexip" AND (event_type="connection_failure" OR event_type="system_restart") AND protocol="h323"