Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49088: CWE-617 Reachable Assertion in Pexip Infinity

0
Medium
VulnerabilityCVE-2025-49088cvecve-2025-49088cwe-617
Published: Thu Dec 25 2025 (12/25/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Pexip
Product: Infinity

Description

Pexip Infinity 32.0 through 37.1 before 37.2, in certain configurations of OTJ (One Touch Join) for Teams SIP Guest Join, has Improper Input Validation in the OTJ service, allowing a remote attacker to trigger a software abort via a crafted calendar invite, leading to a denial of service.

AI-Powered Analysis

AILast updated: 12/25/2025, 05:16:11 UTC

Technical Analysis

CVE-2025-49088 is a vulnerability identified in Pexip Infinity, a widely used video conferencing and collaboration platform, specifically versions 32.0 through 37.1 before 37.2. The vulnerability resides in the One Touch Join (OTJ) service, which facilitates seamless joining of Microsoft Teams meetings via SIP Guest Join. The root cause is improper input validation (classified under CWE-617: Reachable Assertion) in the OTJ service when processing calendar invites. An attacker can craft a malicious calendar invite that triggers an assertion failure within the OTJ service, causing it to abort unexpectedly. This results in a denial of service (DoS) condition, disrupting the ability of users to join meetings via the affected service. The attack vector is network-based and does not require any authentication or user interaction, but the attack complexity is high, as crafting a valid exploit requires detailed knowledge of the OTJ service's input handling. The CVSS v3.1 base score is 5.9, reflecting a medium severity level with no impact on confidentiality or integrity, but a significant impact on availability. No public exploits or active exploitation in the wild have been reported to date. The vulnerability affects configurations where OTJ for Teams SIP Guest Join is enabled, which is common in enterprise environments leveraging Pexip Infinity for Microsoft Teams interoperability. The lack of a patch link suggests that a fix is expected in version 37.2 or later. Organizations relying on Pexip Infinity should assess their exposure and prepare to apply updates promptly.

Potential Impact

For European organizations, the primary impact of CVE-2025-49088 is service disruption due to denial of service on the Pexip Infinity OTJ service. This can interrupt critical video conferencing and collaboration workflows, especially in environments heavily dependent on Microsoft Teams integration. The disruption may affect internal communications, client meetings, and remote collaboration, potentially leading to productivity losses and operational delays. While the vulnerability does not compromise data confidentiality or integrity, the availability impact can be significant in sectors such as finance, healthcare, government, and large enterprises where continuous communication is essential. Additionally, repeated or targeted exploitation could degrade trust in the affected service and necessitate costly incident response efforts. Given the network-based attack vector and lack of authentication requirements, any exposed OTJ service endpoint is at risk, increasing the attack surface. Organizations with hybrid or remote workforces relying on Pexip Infinity for seamless Teams connectivity are particularly vulnerable to operational interruptions.

Mitigation Recommendations

1. Upgrade Pexip Infinity to version 37.2 or later as soon as the patch becomes available to address the vulnerability directly. 2. In the interim, review and restrict OTJ service exposure by limiting network access to trusted sources and implementing network segmentation to isolate the OTJ service. 3. Monitor calendar invite traffic for anomalies or suspicious patterns that could indicate attempts to exploit the vulnerability. 4. Disable or restrict the OTJ feature for Teams SIP Guest Join if it is not essential to business operations, reducing the attack surface. 5. Employ application-layer firewalls or intrusion prevention systems capable of inspecting and filtering malformed calendar invites targeting the OTJ service. 6. Maintain up-to-date backups and incident response plans to quickly recover from potential denial of service events. 7. Engage with Pexip support and subscribe to security advisories for timely updates and guidance. 8. Conduct internal awareness training for IT staff to recognize and respond to potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-05-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694cc4e20921a92379c39d8a

Added to database: 12/25/2025, 5:00:18 AM

Last enriched: 12/25/2025, 5:16:11 AM

Last updated: 12/25/2025, 8:33:50 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats