Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48704: CWE-617 Reachable Assertion in Pexip Infinity

0
High
VulnerabilityCVE-2025-48704cvecve-2025-48704cwe-617
Published: Thu Dec 25 2025 (12/25/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Pexip
Product: Infinity

Description

Pexip Infinity 35.0 through 37.2 before 38.0 has Improper Input Validation in signalling that allows an attacker to trigger a software abort, resulting in a denial of service.

AI-Powered Analysis

AILast updated: 12/25/2025, 05:14:41 UTC

Technical Analysis

CVE-2025-48704 is a vulnerability identified in Pexip Infinity, a widely used video conferencing and collaboration platform. The flaw stems from improper input validation in the signalling component, specifically a reachable assertion (CWE-617) that can be triggered by crafted network messages. When exploited, this assertion failure causes the software to abort unexpectedly, resulting in a denial of service (DoS) condition that disrupts the availability of the conferencing service. The vulnerability affects versions 35.0 through 37.2, with a fix introduced in version 38.0. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector, low attack complexity, no required privileges or user interaction, and a significant impact on availability. There is no impact on confidentiality or integrity. No public exploits or active exploitation have been reported to date. The vulnerability could be leveraged by remote attackers to disrupt communications infrastructure, potentially affecting business continuity and operational workflows dependent on Pexip Infinity. The lack of authentication requirements and the network accessibility of the signalling component increase the risk profile. The vulnerability highlights the importance of robust input validation in real-time communication platforms to prevent assertion failures and service outages.

Potential Impact

For European organizations, the primary impact of CVE-2025-48704 is the potential denial of service of Pexip Infinity-based video conferencing systems. This can disrupt critical communication channels, especially in sectors relying heavily on remote collaboration such as finance, government, healthcare, and large enterprises. The availability impact could lead to operational delays, reduced productivity, and potential financial losses during prolonged outages. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data manipulation are not direct concerns. However, service disruption in unified communications can indirectly affect incident response and coordination during emergencies. Organizations with geographically distributed teams or those conducting sensitive negotiations via Pexip may face increased risk of operational impact. The absence of known exploits reduces immediate threat but does not eliminate the risk, especially as attackers may develop exploits post-disclosure. The vulnerability also poses reputational risks if service outages affect customer-facing operations. Overall, the impact is significant for entities dependent on Pexip Infinity for continuous, reliable communication.

Mitigation Recommendations

1. Upgrade affected Pexip Infinity installations to version 38.0 or later as soon as the patch is available to eliminate the vulnerability. 2. Until patching is possible, implement network-level controls such as firewall rules to restrict access to the signalling component only to trusted IP addresses and internal networks. 3. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tuned to identify malformed signalling messages that could trigger the assertion. 4. Conduct regular input validation audits and fuzz testing on signalling interfaces to proactively identify similar vulnerabilities. 5. Segment the network to isolate Pexip Infinity servers from general user networks, reducing exposure to external attackers. 6. Monitor system logs and service health metrics for signs of abnormal crashes or restarts indicative of exploitation attempts. 7. Develop and test incident response plans specifically addressing video conferencing service outages to minimize operational disruption. 8. Engage with Pexip support and subscribe to security advisories to receive timely updates on patches and mitigation guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-05-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694cc81abddd8c7d7f664830

Added to database: 12/25/2025, 5:14:02 AM

Last enriched: 12/25/2025, 5:14:41 AM

Last updated: 12/25/2025, 8:24:45 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats