Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33850: n/a

0
Medium
VulnerabilityCVE-2024-33850cvecve-2024-33850
Published: Mon Jun 10 2024 (06/10/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Pexip Infinity before 34.1 has Improper Access Control for persons in a waiting room. They can see the conference roster list, and perform certain actions that should not be allowed before they are admitted to the meeting.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:02:54 UTC

Technical Analysis

CVE-2024-33850 is a vulnerability identified in Pexip Infinity, a video conferencing platform widely used for enterprise communications. The flaw exists in versions before 34.1 and relates to improper access control mechanisms governing users placed in a waiting room prior to admission into a conference. Specifically, unauthorized participants in the waiting room can view the conference roster list and execute certain actions that should be restricted until they are formally admitted. This indicates a failure in enforcing proper privilege separation between admitted and waiting users. The vulnerability has a CVSS 3.1 base score of 4.3, reflecting a medium severity level. The vector indicates that the attack requires physical proximity or network access (AV:P - physical), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impacts confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L). No known exploits have been reported in the wild, suggesting it is not yet actively weaponized. The flaw could allow an attacker to gather information about conference participants and potentially disrupt meeting integrity by performing unauthorized actions. The root cause is an access control weakness in the waiting room feature, which should isolate waiting users from sensitive conference data and controls. The vulnerability was reserved in April 2024 and published in June 2024, with no specific patch links provided, but upgrading to version 34.1 or later is implied as the remediation.

Potential Impact

The impact of CVE-2024-33850 is primarily on confidentiality and integrity within video conferencing environments. Unauthorized waiting room users can view participant rosters, potentially exposing sensitive identities and meeting details. This information leakage could facilitate social engineering or targeted attacks. Additionally, the ability to perform certain unauthorized actions before admission could disrupt meeting flow or integrity, though the exact scope of these actions is unspecified. Availability impact is limited but possible if disruptive actions affect meeting stability. Organizations relying on Pexip Infinity for confidential communications, such as government agencies, healthcare providers, and enterprises with sensitive intellectual property, face increased risk of information exposure and meeting disruption. While the attack vector requires network or physical proximity, the lack of authentication or user interaction requirements lowers the barrier to exploitation within accessible environments. The absence of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits post-disclosure. Overall, the vulnerability could undermine trust in secure conferencing and lead to privacy violations or operational interruptions.

Mitigation Recommendations

To mitigate CVE-2024-33850, organizations should promptly upgrade Pexip Infinity to version 34.1 or later where the vulnerability is addressed. In the absence of immediate patching, administrators should review and tighten waiting room configurations to restrict access and minimize exposure. This includes limiting network access to conferencing infrastructure, enforcing strict firewall rules, and monitoring waiting room activity for anomalous behavior. Employing network segmentation to isolate conferencing servers from general user networks can reduce attack surface. Additionally, organizations should implement strong authentication and authorization policies for conference admission, ensuring only trusted users can join meetings. Regularly auditing conference logs and participant lists can help detect unauthorized access attempts. Security teams should stay informed about updates from Pexip and apply vendor advisories promptly. Finally, educating users about the risks of waiting room vulnerabilities and encouraging vigilance can further reduce exploitation likelihood.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c47b7ef31ef0b561d98

Added to database: 2/25/2026, 9:40:23 PM

Last enriched: 2/28/2026, 3:02:54 AM

Last updated: 4/12/2026, 3:40:51 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses