CVE-2025-32096
📋 TL;DR
Pexip Infinity versions 33.0 through 37.0 have improper input validation in signaling that allows attackers to trigger a software abort, causing denial of service. This affects all deployments running vulnerable versions of Pexip Infinity video conferencing platform.
💻 Affected Systems
- Pexip Infinity
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete service disruption of Pexip Infinity conferencing services, affecting all active meetings and connections.
Likely Case
Targeted DoS attacks causing service interruptions for specific conferences or system components.
If Mitigated
Minimal impact with proper network segmentation and monitoring to detect and block attack attempts.
🎯 Exploit Status
CWE-617 suggests relatively straightforward exploitation via malformed signaling input.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 37.1 or later
Vendor Advisory: https://docs.pexip.com/admin/security_bulletins.htm
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download Pexip Infinity 37.1+ from vendor portal. 3. Apply update via management interface. 4. Restart services as prompted. 5. Verify functionality post-update.
🔧 Temporary Workarounds
Network segmentation
linuxRestrict access to signaling ports to trusted networks only
iptables -A INPUT -p tcp --dport <signaling_port> -s <trusted_network> -j ACCEPT
iptables -A INPUT -p tcp --dport <signaling_port> -j DROP
🧯 If You Can't Patch
- Implement strict network ACLs to limit signaling traffic to trusted sources only
- Deploy WAF or IPS with rules to detect malformed signaling patterns
🔍 How to Verify
Check if Vulnerable:
Check Pexip Infinity version via management interface: Admin > System > About
Check Version:
ssh admin@pexip-host 'show version' or check web interface
Verify Fix Applied:
Confirm version is 37.1 or higher and monitor for abnormal service restarts
📡 Detection & Monitoring
Log Indicators:
- Unexpected service restarts
- Abnormal signaling message patterns
- Increased error rates in signaling logs
Network Indicators:
- Spike in malformed SIP/H.323 packets
- Unusual traffic to signaling ports from untrusted sources
SIEM Query:
source="pexip" AND (event_type="service_restart" OR error_code="signaling_error")