CVE-2022-23228

7.5 HIGH

📋 TL;DR

CVE-2022-23228 is an improper WebRTC input validation vulnerability in Pexip Infinity that allows unauthenticated remote attackers to cause denial of service by consuming excessive resources. This affects all Pexip Infinity deployments before version 27.0, potentially disrupting video conferencing services.

💻 Affected Systems

Products:
  • Pexip Infinity
Versions: All versions before 27.0
Operating Systems: All supported Pexip Infinity platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All Pexip Infinity deployments with WebRTC enabled are vulnerable in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage of Pexip Infinity platform, disrupting all video conferences and collaboration services for extended periods.

🟠

Likely Case

Temporary service degradation or intermittent outages affecting some conferences until resources are restored.

🟢

If Mitigated

Minimal impact with proper rate limiting, resource monitoring, and network segmentation in place.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending malformed WebRTC packets, which is relatively straightforward for attackers with basic networking knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 27.0 and later

Vendor Advisory: https://docs.pexip.com/admin/security_bulletins.htm

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Upgrade Pexip Infinity to version 27.0 or later. 3. Restart all Pexip Infinity services. 4. Verify WebRTC functionality post-upgrade.

🔧 Temporary Workarounds

Disable WebRTC

all

Temporarily disable WebRTC functionality to prevent exploitation while planning upgrade.

pexip --disable-webrtc

Implement Rate Limiting

linux

Configure network-level rate limiting for WebRTC traffic to reduce attack surface.

iptables -A INPUT -p udp --dport 3478 -m limit --limit 100/min -j ACCEPT
iptables -A INPUT -p udp --dport 3478 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Pexip Infinity from untrusted networks
  • Deploy Web Application Firewall (WAF) with WebRTC-specific rules and rate limiting

🔍 How to Verify

Check if Vulnerable:

Check Pexip Infinity version via admin interface or CLI: if version is below 27.0, system is vulnerable.

Check Version:

pexip --version

Verify Fix Applied:

Verify version is 27.0 or higher and test WebRTC connections remain functional.

📡 Detection & Monitoring

Log Indicators:

  • Unusual WebRTC connection spikes
  • Resource exhaustion warnings in system logs
  • Failed WebRTC handshake attempts

Network Indicators:

  • Abnormal UDP traffic on port 3478 (STUN)
  • High volume of WebRTC packets from single sources
  • Malformed WebRTC SDP offers

SIEM Query:

source="pexip" AND ("resource exhaustion" OR "webrtc error" OR "connection spike")

🔗 References

📤 Share & Export