Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-24754: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in pjsip pjproject

0
Medium
Published: Fri Mar 11 2022 (03/11/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: pjsip
Product: pjproject

Description

PJSIP is a free and open source multimedia communication library written in C language. In versions prior to and including 2.12 PJSIP there is a stack-buffer overflow vulnerability which only impacts PJSIP users who accept hashed digest credentials (credentials with data_type `PJSIP_CRED_DATA_DIGEST`). This issue has been patched in the master branch of the PJSIP repository and will be included with the next release. Users unable to upgrade need to check that the hashed digest data length must be equal to `PJSIP_MD5STRLEN` before passing to PJSIP.

AI-Powered Analysis

AILast updated: 06/23/2025, 14:42:41 UTC

Technical Analysis

CVE-2022-24754 is a medium-severity stack-based buffer overflow vulnerability identified in the open-source multimedia communication library PJSIP, specifically within the pjproject component. PJSIP is widely used for SIP (Session Initiation Protocol) signaling and multimedia communication in VoIP applications. The vulnerability affects versions up to and including 2.12 of pjproject. It arises from improper handling of hashed digest credentials (data_type `PJSIP_CRED_DATA_DIGEST`) during authentication processes. Specifically, the code does not verify that the length of the hashed digest data matches the expected constant `PJSIP_MD5STRLEN` before copying it onto the stack, leading to a classic buffer overflow (CWE-120). This unchecked copy can overwrite adjacent memory on the stack, potentially allowing an attacker to execute arbitrary code, cause a denial of service, or crash the application. The vulnerability is triggered only when PJSIP is configured to accept hashed digest credentials, which is common in SIP authentication scenarios. The issue has been patched in the master branch of the PJSIP repository, but users who cannot upgrade immediately are advised to implement manual length checks to ensure the hashed digest data length equals `PJSIP_MD5STRLEN` before processing. There are no known exploits in the wild as of the published date, and no official CVSS score has been assigned. However, the vulnerability's nature and context suggest a significant risk if exploited, especially in environments where PJSIP is exposed to untrusted networks or users.

Potential Impact

For European organizations, the impact of this vulnerability can be considerable, particularly for those relying on PJSIP-based VoIP infrastructure, unified communications, or multimedia communication platforms. Exploitation could lead to remote code execution or denial of service, disrupting critical communication services. This can affect enterprises, telecom providers, government agencies, and any sector dependent on SIP-based communication. Confidentiality could be compromised if attackers gain control over the system, potentially intercepting or manipulating voice communications. Integrity and availability are also at risk due to possible application crashes or unauthorized code execution. Given the widespread use of PJSIP in various telephony and communication products, the scope of affected systems is broad. The vulnerability requires no authentication but does require the attacker to send specially crafted SIP messages containing malicious hashed digest credentials, which is feasible in exposed or poorly segmented networks. This elevates the risk in environments with public-facing SIP endpoints or inadequate network controls. The absence of known exploits suggests limited active targeting currently, but the potential impact warrants proactive mitigation.

Mitigation Recommendations

1. Upgrade to the latest version of pjproject where the vulnerability is patched as soon as possible. 2. For environments where immediate upgrade is not feasible, implement strict input validation by verifying that the length of the hashed digest credential data equals `PJSIP_MD5STRLEN` before processing. 3. Employ network segmentation and restrict access to SIP services to trusted networks and users only, minimizing exposure to untrusted sources. 4. Deploy SIP-aware intrusion detection and prevention systems (IDS/IPS) to monitor and block malformed or suspicious SIP authentication attempts. 5. Regularly audit and monitor logs for unusual authentication failures or malformed SIP messages that could indicate exploitation attempts. 6. Apply principle of least privilege to the systems running PJSIP to limit the impact of potential exploitation. 7. Educate network and security teams about this specific vulnerability to ensure rapid detection and response if exploitation attempts occur.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf2773

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 2:42:41 PM

Last updated: 2/7/2026, 3:35:51 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats