Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12206: NULL Pointer Dereference in Kamailio

0
Medium
VulnerabilityCVE-2025-12206cvecve-2025-12206
Published: Mon Oct 27 2025 (10/27/2025, 02:32:12 UTC)
Source: CVE Database V5
Product: Kamailio

Description

A flaw has been found in Kamailio 5.5. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and may be used. It is still unclear if this vulnerability genuinely exists. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:35:42 UTC

Technical Analysis

CVE-2025-12206 is a vulnerability identified in Kamailio version 5.5, specifically within the function rve_is_constant in the source file src/core/rvalue.c. The issue arises from a NULL pointer dereference caused by improper handling of certain conditions during runtime evaluation of configuration expressions. This flaw can lead to a denial of service (DoS) by crashing the Kamailio SIP server process. Exploitation requires local access to the system and the ability to manipulate Kamailio configuration files, which are typically protected and not easily altered by unprivileged users. The vulnerability does not require user interaction beyond local access, nor does it allow for remote exploitation or privilege escalation. The vendor was notified prior to public disclosure but did not respond, and no official patch or mitigation guidance has been released. An exploit has been published, but its practical applicability is limited by the need for local privileges and configuration file manipulation. The CVSS 4.0 base score of 4.8 reflects these factors, indicating a medium severity level. This vulnerability primarily affects the availability of the Kamailio service by causing crashes, without impacting confidentiality or integrity.

Potential Impact

The primary impact of CVE-2025-12206 is a denial of service condition resulting from a crash of the Kamailio SIP server. This can disrupt VoIP communications and related services relying on Kamailio, potentially affecting business operations that depend on real-time communication. Since exploitation requires local access and configuration file manipulation, the risk of widespread remote attacks is low. However, insider threats or attackers who have already compromised local access could leverage this vulnerability to cause service outages. The lack of vendor response and patch availability increases the window of exposure. Organizations with critical telephony infrastructure using Kamailio 5.5 may experience service interruptions, impacting customer service, internal communications, and potentially emergency response capabilities. The vulnerability does not appear to allow data leakage or privilege escalation, limiting its impact to availability only.

Mitigation Recommendations

To mitigate CVE-2025-12206, organizations should implement strict local access controls to prevent unauthorized users from accessing or modifying Kamailio configuration files. File system permissions should be reviewed and hardened to restrict write access to trusted administrators only. Monitoring and alerting on changes to Kamailio configuration files can provide early detection of potential exploitation attempts. Running Kamailio with the least privileges necessary and isolating it within a secure environment can reduce the risk of local exploitation. Since no official patch is available, consider upgrading to a later Kamailio version if it addresses this issue or applying community-provided patches after thorough testing. Additionally, implementing system-level protections such as SELinux or AppArmor profiles can limit the impact of crashes and prevent unauthorized configuration changes. Regular backups of configuration files and service restart procedures should be in place to quickly recover from any denial of service caused by exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T11:52:17.451Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68fee1ba23a7bbed324e8ba6

Added to database: 10/27/2025, 3:06:34 AM

Last enriched: 2/24/2026, 9:35:42 PM

Last updated: 3/21/2026, 3:45:26 PM

Views: 217

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses