Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12204: Heap-based Buffer Overflow in Kamailio

0
Medium
VulnerabilityCVE-2025-12204cvecve-2025-12204
Published: Mon Oct 27 2025 (10/27/2025, 02:02:11 UTC)
Source: CVE Database V5
Product: Kamailio

Description

A security vulnerability has been detected in Kamailio 5.5. Impacted is the function rve_destroy of the file src/core/rvalue.c of the component Configuration File Handler. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. There is ongoing doubt regarding the real existence of this vulnerability. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 11/10/2025, 07:01:59 UTC

Technical Analysis

CVE-2025-12204 identifies a heap-based buffer overflow vulnerability in Kamailio version 5.5, a widely used open-source SIP server for VoIP communications. The flaw resides in the rve_destroy function of the src/core/rvalue.c file, which is part of the configuration file handler component. When configuration files are manipulated locally, this function can improperly handle memory, leading to a heap overflow condition. This memory corruption could allow an attacker with local privileges to execute arbitrary code, escalate privileges, or cause a denial of service by crashing the service. However, exploitation requires local access and the ability to modify configuration files, which is a significant barrier in many environments. The vulnerability has been publicly disclosed, but the vendor has not issued a patch or responded to the report. There is also some skepticism about the vulnerability's practical exploitability due to the complexity of the attack vector. The CVSS 4.0 score is 4.8 (medium), reflecting the local attack vector, low complexity, and limited scope of impact. No known exploits are currently active in the wild.

Potential Impact

For European organizations, the impact of CVE-2025-12204 depends largely on their deployment of Kamailio 5.5 and the level of local access control. Organizations in telecommunications, VoIP service providers, and enterprises using Kamailio as part of their communication infrastructure could face risks of service disruption or unauthorized privilege escalation if local attackers gain access. The vulnerability could lead to denial of service, impacting availability of critical communication services. Confidentiality and integrity impacts are possible but less likely without further exploitation steps. Given the local attack requirement, the threat is more significant in environments where multiple users have local system access or where attackers can gain such access through other means. The lack of vendor response and patch availability increases risk exposure until mitigations are applied.

Mitigation Recommendations

1. Restrict local access to systems running Kamailio 5.5, ensuring only trusted administrators have shell or console access. 2. Harden file system permissions on Kamailio configuration files to prevent unauthorized modification. 3. Monitor system logs and file integrity to detect unauthorized changes to configuration files. 4. Consider deploying Kamailio in containerized or sandboxed environments to limit impact of local exploits. 5. Regularly audit user accounts and remove unnecessary local privileges. 6. Stay alert for vendor updates or community patches addressing this vulnerability. 7. If possible, upgrade to a later Kamailio version once a fix is available. 8. Employ host-based intrusion detection systems (HIDS) to identify suspicious local activity related to configuration file manipulation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T11:52:06.759Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68fedab123a7bbed324d60d0

Added to database: 10/27/2025, 2:36:33 AM

Last enriched: 11/10/2025, 7:01:59 AM

Last updated: 12/13/2025, 8:17:22 PM

Views: 159

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats