Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48704: CWE-617 Reachable Assertion in Pexip Infinity

0
High
VulnerabilityCVE-2025-48704cvecve-2025-48704cwe-617
Published: Thu Dec 25 2025 (12/25/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Pexip
Product: Infinity

Description

CVE-2025-48704 is a high-severity vulnerability in Pexip Infinity versions 35. 0 through 37. 2 prior to 38. 0, caused by improper input validation in the signalling component. This flaw allows an unauthenticated remote attacker to trigger a reachable assertion failure, causing the software to abort and resulting in a denial of service (DoS). The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires no privileges or user interaction and can be performed remotely over the network. There are no known exploits in the wild yet, and no patches have been linked at the time of publication. European organizations using Pexip Infinity for video conferencing and collaboration services are at risk of service disruption. Countries with higher adoption of Pexip solutions and critical reliance on unified communications are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/01/2026, 22:40:11 UTC

Technical Analysis

CVE-2025-48704 is a vulnerability identified in Pexip Infinity, a widely used video conferencing and collaboration platform. The flaw exists in versions 35.0 through 37.2 before 38.0 and stems from improper input validation within the signalling component, specifically categorized under CWE-617 (Reachable Assertion). An attacker can send specially crafted signalling messages that cause the software to hit an assertion failure, leading to an immediate software abort. This results in a denial of service condition, disrupting the availability of the Pexip Infinity service. The vulnerability is remotely exploitable without requiring any authentication or user interaction, increasing the risk of widespread impact. The CVSS v3.1 score is 7.5 (high), reflecting the ease of exploitation and the significant impact on availability, though confidentiality and integrity remain unaffected. No known exploits have been observed in the wild, and no official patches have been linked yet, indicating that organizations must proactively monitor and prepare for remediation. The vulnerability affects core signalling processes, which are critical for establishing and maintaining communication sessions, making this a significant risk for enterprises relying on Pexip for unified communications.

Potential Impact

For European organizations, the primary impact of CVE-2025-48704 is the potential disruption of video conferencing and collaboration services provided by Pexip Infinity. This can lead to operational downtime, affecting business continuity, especially for sectors heavily reliant on remote communication such as finance, healthcare, government, and large enterprises. The denial of service could interrupt critical meetings, customer interactions, and internal communications, potentially causing financial losses and reputational damage. Since the vulnerability does not compromise data confidentiality or integrity, the risk of data breaches is low; however, the availability impact alone can be severe. Organizations with high dependency on Pexip's platform for daily operations will be more vulnerable to productivity losses. Additionally, the lack of authentication requirement for exploitation increases the threat surface, allowing external attackers to disrupt services without insider access. This could be leveraged in targeted attacks or as part of broader disruption campaigns, especially in geopolitical contexts where communication disruption is a strategic objective.

Mitigation Recommendations

1. Upgrade to Pexip Infinity version 38.0 or later as soon as the patch becomes available to address the improper input validation issue. 2. Until a patch is applied, implement network-level controls such as firewall rules or intrusion prevention systems to filter and rate-limit signalling traffic to and from Pexip servers, reducing the risk of malicious input triggering the assertion failure. 3. Monitor Pexip Infinity logs and system health metrics for signs of abnormal crashes or restarts that could indicate exploitation attempts. 4. Employ network segmentation to isolate Pexip infrastructure from less trusted networks, minimizing exposure. 5. Conduct regular vulnerability assessments and penetration testing focused on the signalling components to identify potential exploitation vectors. 6. Develop and test incident response plans specifically for denial of service scenarios affecting communication platforms to ensure rapid recovery. 7. Engage with Pexip support and subscribe to security advisories to receive timely updates and patches. 8. Educate IT and security teams about this vulnerability to increase awareness and readiness for detection and mitigation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-05-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694cc81abddd8c7d7f664830

Added to database: 12/25/2025, 5:14:02 AM

Last enriched: 1/1/2026, 10:40:11 PM

Last updated: 2/7/2026, 1:19:34 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats