CVE-2025-66378

5.9 MEDIUM

📋 TL;DR

Pexip Infinity versions 38.0 and 38.1 have an insufficient access control vulnerability in their RTMP implementation. This allows attackers to disconnect RTMP streams passing through Proxy Nodes, potentially disrupting video conferencing sessions. Organizations using affected Pexip Infinity versions with RTMP streams via Proxy Nodes are vulnerable.

💻 Affected Systems

Products:
  • Pexip Infinity
Versions: 38.0 through 38.1 (before 39.0)
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using RTMP streams traversing Proxy Nodes. Other configurations may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could disrupt critical video conferences, meetings, or live streams by disconnecting RTMP streams, causing service disruption and business impact.

🟠

Likely Case

Attackers disrupt RTMP streams in video conferences, causing temporary service interruptions and degraded user experience.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated network segments with minimal business disruption.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves insufficient access control, suggesting relatively straightforward exploitation if RTMP endpoints are accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 39.0

Vendor Advisory: https://docs.pexip.com/admin/security_bulletins.htm

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download Pexip Infinity 39.0 from official sources. 3. Follow Pexip upgrade documentation for your deployment type. 4. Apply the update. 5. Verify functionality post-upgrade.

🔧 Temporary Workarounds

Disable RTMP on Proxy Nodes

all

Temporarily disable RTMP streaming through Proxy Nodes to prevent exploitation

Configure Proxy Nodes to reject RTMP connections via management interface

Network Segmentation

all

Restrict network access to Proxy Node RTMP endpoints

Implement firewall rules to limit RTMP access to trusted sources only

🧯 If You Can't Patch

  • Implement strict network access controls to limit RTMP traffic to Proxy Nodes
  • Monitor RTMP connections for unauthorized disconnection attempts

🔍 How to Verify

Check if Vulnerable:

Check Pexip Infinity version via management interface. If version is 38.0 or 38.1 and RTMP is configured on Proxy Nodes, system is vulnerable.

Check Version:

Check via Pexip Management Node web interface or API

Verify Fix Applied:

Verify version is 39.0 or later via management interface and test RTMP stream functionality through Proxy Nodes.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected RTMP stream disconnections
  • Unauthorized access attempts to Proxy Node RTMP endpoints

Network Indicators:

  • Unusual RTMP traffic patterns to Proxy Nodes
  • RTMP disconnect commands from untrusted sources

SIEM Query:

Search for RTMP disconnect events from non-standard sources in Proxy Node logs

🔗 References

📤 Share & Export