CVE-2025-66379

7.5 HIGH

📋 TL;DR

CVE-2025-66379 is an improper input validation vulnerability in Pexip Infinity's media implementation that allows remote attackers to trigger a software abort via crafted media streams, causing denial of service. This affects all Pexip Infinity deployments before version 39.0, potentially disrupting video conferencing services.

💻 Affected Systems

Products:
  • Pexip Infinity
Versions: All versions before 39.0
Operating Systems: Linux-based Pexip Infinity appliances
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Pexip Infinity deployments are affected; no special configuration required for vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of Pexip Infinity platform, rendering video conferencing services unavailable until manual restart or recovery procedures.

🟠

Likely Case

Partial or complete denial of service affecting specific conferences or media streams, requiring service restart to restore functionality.

🟢

If Mitigated

Limited impact with proper network segmentation and input validation controls, potentially affecting only isolated components.

🌐 Internet-Facing: HIGH - Media streams are typically exposed to external participants, making internet-facing deployments highly vulnerable to remote exploitation.
🏢 Internal Only: MEDIUM - Internal deployments still vulnerable but attack surface reduced compared to internet-facing systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Crafting malicious media streams to trigger input validation failures is relatively straightforward.

Exploitation requires sending specially crafted media streams to vulnerable endpoints, which are typically exposed in video conferencing scenarios.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 39.0 or later

Vendor Advisory: https://docs.pexip.com/admin/security_bulletins.htm

Restart Required: Yes

Instructions:

1. Download Pexip Infinity version 39.0 or later from Pexip support portal. 2. Follow Pexip upgrade procedures for your deployment type. 3. Apply the update to all nodes in your deployment. 4. Restart services as required by the upgrade process.

🔧 Temporary Workarounds

Network segmentation and filtering

all

Restrict access to media ports and implement network filtering to block suspicious media streams.

Rate limiting media streams

all

Implement rate limiting on media ingress to reduce impact of potential DoS attempts.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can send media streams to the Pexip Infinity system.
  • Deploy intrusion detection/prevention systems to monitor for abnormal media stream patterns and block suspicious traffic.

🔍 How to Verify

Check if Vulnerable:

Check Pexip Infinity version via admin interface or SSH: 'pexip --version' or check web admin dashboard.

Check Version:

pexip --version

Verify Fix Applied:

Verify version is 39.0 or higher and test media stream functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service restarts
  • Media processing errors
  • Abnormal termination of media handling processes

Network Indicators:

  • Unusual media stream patterns
  • High volume of malformed RTP/RTCP packets
  • Sudden service unavailability on media ports

SIEM Query:

source="pexip" AND ("abort" OR "crash" OR "denial" OR "media error")

🔗 References

📤 Share & Export