Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12205: Use After Free in Kamailio

0
Medium
VulnerabilityCVE-2025-12205cvecve-2025-12205
Published: Mon Oct 27 2025 (10/27/2025, 02:32:07 UTC)
Source: CVE Database V5
Product: Kamailio

Description

A vulnerability was detected in Kamailio 5.5. The affected element is the function sr_push_yy_state of the file src/core/cfg.lex of the component Configuration File Handler. The manipulation results in use after free. The attack must be initiated from a local position. The exploit is now public and may be used. The real existence of this vulnerability is still doubted at the moment. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:35:27 UTC

Technical Analysis

CVE-2025-12205 is a use-after-free vulnerability identified in Kamailio version 5.5, an open-source SIP server widely used for VoIP communications. The flaw resides in the sr_push_yy_state function of the src/core/cfg.lex file, which is part of the configuration file handler component. A use-after-free occurs when the program continues to use memory after it has been freed, potentially leading to memory corruption, crashes, or arbitrary code execution. However, exploitation of this vulnerability requires an attacker to have local access to the system and the ability to manipulate Kamailio configuration files. This significantly limits the attack vector, as remote exploitation is not feasible without prior compromise. The vulnerability was publicly disclosed with a CVSS v4.0 score of 4.8, indicating medium severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required beyond local access (PR:L), and no user interaction needed (UI:N). The vendor has not issued any response or patch, and the exploit code is publicly available, although the real-world impact remains uncertain due to the constrained exploitation scenario. The vulnerability could lead to partial confidentiality, integrity, and availability impacts if exploited, such as service disruption or unauthorized configuration changes. Organizations running Kamailio 5.5 should consider this vulnerability seriously, especially in environments where local access controls are weak or where configuration files might be exposed to unauthorized modification.

Potential Impact

The potential impact of CVE-2025-12205 includes partial compromise of the Kamailio SIP server's confidentiality, integrity, and availability. Exploiting the use-after-free could cause service crashes or enable an attacker to execute arbitrary code with local privileges, potentially disrupting VoIP services. Given Kamailio's role in handling SIP signaling for voice communications, such disruptions could affect telephony availability and reliability. However, the requirement for local access and configuration file manipulation reduces the likelihood of widespread exploitation. Organizations with lax local access controls or shared environments are at higher risk. The absence of vendor patches prolongs exposure, increasing the window for potential exploitation. Overall, the impact is moderate but could be significant in sensitive telephony infrastructures or multi-tenant environments where local access is less restricted.

Mitigation Recommendations

To mitigate CVE-2025-12205, organizations should implement strict local access controls to prevent unauthorized users from accessing the Kamailio server or its configuration files. Employ file system permissions to restrict write access to configuration files only to trusted administrators. Regularly monitor and audit configuration files for unauthorized changes using file integrity monitoring tools. Consider isolating Kamailio instances in hardened environments or containers to limit local attack surfaces. Until an official patch is released, applying runtime protections such as AddressSanitizer or other memory safety tools during testing may help detect exploitation attempts. Additionally, maintain up-to-date backups of configuration files to enable quick recovery in case of tampering. Engage with the Kamailio community or vendors for updates and patches, and plan for timely patch application once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T11:52:14.661Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68fee1ba23a7bbed324e8ba0

Added to database: 10/27/2025, 3:06:34 AM

Last enriched: 2/24/2026, 9:35:27 PM

Last updated: 3/26/2026, 8:37:39 AM

Views: 226

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses