CVE-2021-42555
📋 TL;DR
CVE-2021-42555 is an input validation vulnerability in Pexip Infinity that allows temporary remote denial of service by causing service abortion during call setup. This affects all Pexip Infinity deployments before version 26.2 that process external call requests.
💻 Affected Systems
- Pexip Infinity
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers can cause complete service disruption for all video conferencing calls, rendering the Pexip Infinity platform temporarily unavailable for all users.
Likely Case
Targeted DoS attacks against specific conferences or meeting rooms, causing temporary disruption to business communications.
If Mitigated
With proper network segmentation and rate limiting, impact is limited to isolated service components with automatic recovery.
🎯 Exploit Status
Exploitation requires sending malformed call setup packets but no authentication or special privileges.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 26.2 or later
Vendor Advisory: https://docs.pexip.com/admin/security_bulletins.htm
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download Pexip Infinity 26.2 or later from Pexip support portal. 3. Apply update via management interface. 4. Restart services as prompted.
🔧 Temporary Workarounds
Network segmentation and filtering
allRestrict access to call setup ports (5060-5061 TCP/UDP for SIP, 1720 TCP for H.323) to trusted sources only.
Rate limiting
allImplement rate limiting on SIP/H.323 ports to prevent rapid exploitation attempts.
🧯 If You Can't Patch
- Implement strict network ACLs allowing only trusted endpoints to connect to call setup ports
- Deploy intrusion prevention systems with signatures for malformed SIP/H.323 packets
🔍 How to Verify
Check if Vulnerable:
Check Pexip Infinity version via management interface: Settings > System > About. If version is below 26.2, system is vulnerable.
Check Version:
ssh admin@pexip-host 'pexip --version'
Verify Fix Applied:
After patching, verify version is 26.2 or higher and test call setup functionality with legitimate clients.
📡 Detection & Monitoring
Log Indicators:
- Abnormal call setup failures
- Service restart logs
- High rate of malformed SIP/H.323 packets in system logs
Network Indicators:
- Unusual traffic patterns on SIP/H.323 ports
- Rapid connection attempts from single sources
- Malformed protocol packets
SIEM Query:
source="pexip" AND ("abort" OR "restart" OR "call setup failed")