Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12207: NULL Pointer Dereference in Kamailio

0
Medium
VulnerabilityCVE-2025-12207cvecve-2025-12207
Published: Mon Oct 27 2025 (10/27/2025, 02:32:17 UTC)
Source: CVE Database V5
Product: Kamailio

Description

A vulnerability has been found in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The actual existence of this vulnerability is currently in question. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 21:35:57 UTC

Technical Analysis

CVE-2025-12207 is a vulnerability identified in Kamailio version 5.5, specifically within the Grammar Rule Handler component's yyerror_at function located in the src/core/cfg.y source file. The issue arises from a NULL pointer dereference triggered by improper handling of configuration file inputs. When an attacker with local access manipulates the configuration files, the function may dereference a NULL pointer, causing the Kamailio process to crash or behave unpredictably. This vulnerability does not require user interaction or elevated privileges beyond local access, but the attack vector is constrained by the necessity to modify configuration files, which are typically protected and require some level of privilege. The vulnerability has a CVSS 4.8 score, reflecting its medium severity, with an attack vector classified as local and low complexity. No authentication or user interaction is needed, but the scope is limited to local privilege. The vendor has not issued any patches or advisories, and the exploit has been publicly disclosed, though the actual existence and exploitability have been questioned. The primary impact is denial of service due to service crashes, potentially disrupting SIP communications managed by Kamailio.

Potential Impact

The primary impact of CVE-2025-12207 is on the availability of Kamailio services. A successful exploitation leads to a NULL pointer dereference, causing the Kamailio process to crash and resulting in denial of service. This can disrupt SIP-based communications, affecting VoIP infrastructure, session management, and real-time communication services relying on Kamailio. Since exploitation requires local access and configuration file manipulation, the risk is mitigated in environments with strict access controls. However, in scenarios where local access is possible, such as multi-tenant servers, compromised internal hosts, or insider threats, this vulnerability could be leveraged to cause service outages. The lack of vendor response and patches increases the risk of prolonged exposure. Organizations relying on Kamailio 5.5 for critical communications may experience service interruptions, impacting business operations and customer communications.

Mitigation Recommendations

To mitigate CVE-2025-12207, organizations should implement strict access controls to limit local access to systems running Kamailio, ensuring only trusted administrators can modify configuration files. Employ file integrity monitoring solutions to detect unauthorized changes to Kamailio configuration files promptly. Consider running Kamailio with the least privileges necessary and isolate it within secure environments or containers to reduce the attack surface. Regularly audit user permissions and monitor logs for suspicious local activity. Until an official patch is released, avoid upgrading to or deploying Kamailio 5.5 in environments where local access cannot be tightly controlled. If possible, downgrade to earlier versions not affected by this vulnerability or apply custom patches if available from the community. Maintain up-to-date backups of configuration files to enable quick recovery from potential crashes or misconfigurations. Engage with Kamailio community channels for updates and potential fixes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T11:52:20.560Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68fee1ba23a7bbed324e8bac

Added to database: 10/27/2025, 3:06:34 AM

Last enriched: 2/24/2026, 9:35:57 PM

Last updated: 3/26/2026, 10:21:58 AM

Views: 221

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses