Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53399: CWE-346 Origin Validation Error in Sipwise rtpengine

0
Medium
VulnerabilityCVE-2025-53399cvecve-2025-53399cwe-346
Published: Fri Aug 01 2025 (08/01/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Sipwise
Product: rtpengine

Description

In Sipwise rtpengine before 13.4.1.1, an origin-validation error in the endpoint-learning logic of the media-relay core allows remote attackers to inject or intercept RTP/SRTP media streams via RTP packets (except when the relay is configured for strict source and learning disabled). Version 13.4.1.1 fixes the heuristic mode by limiting exposure to the first five packets, and introduces a recrypt flag that fully prevents SRTP attacks when both mitigations are enabled.

AI-Powered Analysis

AILast updated: 11/11/2025, 06:25:15 UTC

Technical Analysis

CVE-2025-53399 is a vulnerability in Sipwise rtpengine, a media relay component used in VoIP and real-time communication systems. The issue stems from a CWE-346 origin validation error within the endpoint-learning logic of the media-relay core. Specifically, the rtpengine heuristically learns endpoints from incoming RTP packets to relay media streams. However, prior to version 13.4.1.1, this logic insufficiently validates the origin of RTP/SRTP packets, allowing remote attackers to inject malicious RTP packets or intercept legitimate media streams. This can compromise the confidentiality and integrity of voice or video communications by enabling man-in-the-middle style attacks or unauthorized media injection. The vulnerability is exploitable remotely without authentication or user interaction, increasing its risk profile. The vendor addressed the issue by limiting the heuristic learning exposure to the first five packets and introducing a 'recrypt' flag that, when enabled alongside strict source configuration and learning disabled, fully prevents SRTP attacks. The vulnerability has a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, lack of required privileges or user interaction, and limited impact on availability but notable impact on confidentiality and integrity. No known exploits are reported in the wild as of publication. This vulnerability affects all versions before 13.4.1.1, and organizations relying on Sipwise rtpengine for media relay in their VoIP infrastructure should prioritize patching and configuration hardening to mitigate risk.

Potential Impact

The vulnerability allows attackers to intercept or inject RTP/SRTP media streams, potentially compromising the confidentiality and integrity of real-time communications such as voice and video calls. For European organizations, this can lead to eavesdropping on sensitive conversations, insertion of malicious media content, or disruption of communication services. Telecom providers, enterprises using VoIP systems, and critical infrastructure relying on secure media relay are particularly at risk. The impact extends to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential financial losses. Since exploitation requires no authentication and can be performed remotely, the attack surface is broad. However, the vulnerability does not directly affect availability, limiting denial-of-service risks. The mitigations introduced reduce the window of exposure and can fully prevent attacks when properly configured, but failure to update or misconfiguration leaves systems vulnerable.

Mitigation Recommendations

1. Upgrade all affected Sipwise rtpengine instances to version 13.4.1.1 or later immediately to apply the official fix. 2. Configure the rtpengine to operate in strict source mode, disabling endpoint learning to prevent heuristic acceptance of RTP packets from unverified sources. 3. Enable the 'recrypt' flag introduced in the patch to fully prevent SRTP attacks, ensuring encrypted media streams cannot be intercepted or manipulated. 4. Conduct network segmentation to isolate media relay components and restrict access to trusted sources only. 5. Monitor RTP traffic for anomalies indicative of injection or interception attempts using specialized VoIP security tools. 6. Implement logging and alerting on rtpengine endpoints to detect suspicious packet patterns early. 7. Regularly audit configurations and perform penetration testing focused on media relay components to verify the effectiveness of mitigations. 8. Educate network and security teams about this vulnerability and the importance of strict media relay configurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-29T00:00:00.000Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 688c355dad5a09ad00bf552d

Added to database: 8/1/2025, 3:32:45 AM

Last enriched: 11/11/2025, 6:25:15 AM

Last updated: 12/3/2025, 4:21:31 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats