Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-24260: n/a

0
High
VulnerabilityCVE-2024-24260cvecve-2024-24260
Published: Mon Feb 05 2024 (02/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

media-server v1.0.0 was discovered to contain a Use-After-Free (UAF) vulnerability via the sip_subscribe_remove function at /uac/sip-uac-subscribe.c.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:21:40 UTC

Technical Analysis

CVE-2024-24260 is a Use-After-Free (UAF) vulnerability identified in media-server version 1.0.0, specifically within the sip_subscribe_remove function located in the /uac/sip-uac-subscribe.c source file. The vulnerability arises when the function improperly handles memory, leading to a scenario where a pointer to freed memory is accessed, causing undefined behavior. This can be exploited remotely without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The primary impact is on availability, as exploitation can cause the media-server process to crash, resulting in denial of service (DoS). The vulnerability is classified under CWE-416 (Use After Free), a common memory corruption issue that can lead to crashes or potentially code execution in some contexts, though no integrity or confidentiality impacts are currently noted. No patches or fixes have been released at the time of publication, and no active exploitation has been reported. The vulnerability affects the media-server software used in SIP-based communication systems, which are critical in VoIP and multimedia streaming environments.

Potential Impact

The primary impact of CVE-2024-24260 is denial of service, which can disrupt communication services relying on the affected media-server. Organizations using this software in their SIP infrastructure may experience service outages, affecting voice and video communications. This can lead to operational downtime, loss of productivity, and potential reputational damage, especially for service providers and enterprises dependent on real-time communications. Although the vulnerability does not directly compromise confidentiality or integrity, the availability impact alone can be significant in environments where continuous communication is critical, such as emergency services, financial institutions, and large enterprises. The ease of remote exploitation without authentication increases the risk of widespread attacks once exploit code becomes available.

Mitigation Recommendations

Until an official patch is released, organizations should implement network-level mitigations such as restricting access to the media-server to trusted networks and IP addresses only. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures to detect anomalous SIP subscribe traffic patterns may help identify exploitation attempts. Regularly monitoring system logs and service health can provide early warning signs of attempted exploitation or crashes. Administrators should also consider isolating the media-server in a segmented network zone to limit potential impact. Once patches or updates become available from the vendor, they should be applied promptly. Additionally, conducting a thorough code audit and memory management review of the sip_subscribe_remove function and related components is recommended to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d58b7ef31ef0b5708f9

Added to database: 2/25/2026, 9:44:56 PM

Last enriched: 2/26/2026, 10:21:40 AM

Last updated: 4/12/2026, 6:17:42 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses