CVE-2025-59683

8.2 HIGH

📋 TL;DR

Pexip Infinity versions 15.0 through 38.0 have an improper access control vulnerability in the Secure Scheduler for Exchange service when using Office 365 Legacy Exchange Tokens. This allows remote attackers to read sensitive data and cause denial of service through resource exhaustion. Organizations using affected Pexip Infinity versions with Office 365 Legacy Exchange Tokens are vulnerable.

💻 Affected Systems

Products:
  • Pexip Infinity
Versions: 15.0 through 38.0 (before 38.1)
Operating Systems: All supported Pexip Infinity platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects configurations using Office 365 Legacy Exchange Tokens with the Secure Scheduler for Exchange service.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through sensitive data exposure and sustained denial of service affecting all video conferencing functionality.

🟠

Likely Case

Unauthorized access to scheduling data and intermittent service disruption affecting meeting reliability.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, potentially only affecting isolated scheduling components.

🌐 Internet-Facing: HIGH - The vulnerability affects remote access to scheduling services which are typically internet-facing for external participants.
🏢 Internal Only: MEDIUM - Internal users could exploit the vulnerability, but external attackers pose greater risk due to broader access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the scheduling service but does not require authentication to the Pexip Infinity platform itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 38.1 or later

Vendor Advisory: https://docs.pexip.com/admin/security_bulletins.htm

Restart Required: Yes

Instructions:

1. Download Pexip Infinity version 38.1 or later from the Pexip support portal. 2. Follow the Pexip Infinity upgrade procedure documented in the administration guide. 3. Restart all Pexip Infinity services after upgrade completion.

🔧 Temporary Workarounds

Disable Legacy Exchange Tokens

all

Switch from Office 365 Legacy Exchange Tokens to modern authentication methods

Configure Exchange integration to use modern OAuth 2.0 authentication instead of legacy tokens

Restrict Network Access

all

Limit access to the Secure Scheduler service to trusted networks only

Configure firewall rules to restrict access to TCP ports used by Secure Scheduler service

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Secure Scheduler service from untrusted networks
  • Enable detailed logging and monitoring for suspicious access patterns to scheduling endpoints

🔍 How to Verify

Check if Vulnerable:

Check Pexip Infinity version via admin interface and verify if using Office 365 Legacy Exchange Tokens with Secure Scheduler

Check Version:

From Pexip admin interface: System > About, or SSH to management node and run 'pexip --version'

Verify Fix Applied:

Confirm version is 38.1 or later and verify Secure Scheduler service is functioning normally

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of requests to /api/admin/scheduler/ endpoints
  • Failed authentication attempts followed by successful scheduling operations
  • Resource exhaustion alerts from Pexip monitoring

Network Indicators:

  • High volume of requests to scheduling API from unexpected sources
  • Traffic patterns indicating enumeration of scheduling data

SIEM Query:

source="pexip" AND (uri_path="/api/admin/scheduler/*" OR event_type="scheduler_access") AND status_code=200 | stats count by src_ip

🔗 References

📤 Share & Export