CVE-2025-48704
📋 TL;DR
Pexip Infinity versions 35.0 through 37.2 have an improper input validation vulnerability in signalling that allows attackers to trigger a software abort, causing denial of service. This affects all deployments running vulnerable versions of Pexip Infinity video conferencing software.
💻 Affected Systems
- Pexip Infinity
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete service disruption of Pexip Infinity platform, making video conferencing unavailable for all users until service restart.
Likely Case
Targeted denial of service attacks causing service interruptions for specific conferences or system components.
If Mitigated
Limited impact with proper network segmentation and monitoring, though service disruption still possible.
🎯 Exploit Status
The vulnerability requires sending malformed signalling packets but does not require authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 38.0 or later
Vendor Advisory: https://docs.pexip.com/admin/security_bulletins.htm
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download Pexip Infinity 38.0 or later from Pexip support portal. 3. Apply the update following Pexip's upgrade procedures. 4. Restart the system as required.
🔧 Temporary Workarounds
Network segmentation and filtering
allRestrict access to Pexip Infinity signalling ports to trusted networks only
Rate limiting
allImplement rate limiting on signalling traffic to reduce impact of DoS attempts
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach Pexip Infinity signalling ports
- Deploy intrusion prevention systems with DoS protection capabilities in front of Pexip Infinity
🔍 How to Verify
Check if Vulnerable:
Check Pexip Infinity version via web admin interface or SSH: grep 'version' /opt/pexip/etc/version
Check Version:
grep 'version' /opt/pexip/etc/version
Verify Fix Applied:
Confirm version is 38.0 or later and monitor for abnormal service aborts
📡 Detection & Monitoring
Log Indicators:
- Unexpected service aborts
- Signalling protocol errors
- Process termination logs
Network Indicators:
- Unusual signalling traffic patterns
- Malformed SIP/H.323 packets
SIEM Query:
source="pexip" AND (event="service_abort" OR event="process_termination")