Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66378: CWE-863 Incorrect Authorization in Pexip Infinity

0
Medium
VulnerabilityCVE-2025-66378cvecve-2025-66378cwe-863
Published: Thu Dec 25 2025 (12/25/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Pexip
Product: Infinity

Description

CVE-2025-66378 is a medium severity vulnerability in Pexip Infinity versions 38. 0 and 38. 1 prior to 39. 0, caused by incorrect authorization in the RTMP implementation. This flaw allows unauthenticated attackers to disconnect RTMP streams passing through a Proxy Node, impacting availability but not confidentiality or integrity. Exploitation requires network access but no user interaction or privileges. The vulnerability affects organizations using Pexip Infinity for video conferencing and streaming, potentially disrupting communication services. European organizations relying on Pexip, especially in countries with high adoption of video conferencing infrastructure, are at risk. Mitigation involves upgrading to version 39. 0 or later once available and restricting network access to Proxy Nodes.

AI-Powered Analysis

AILast updated: 01/01/2026, 22:41:08 UTC

Technical Analysis

CVE-2025-66378 is an authorization vulnerability classified under CWE-863 found in Pexip Infinity versions 38.0 and 38.1 before 39.0. The flaw resides in the RTMP (Real-Time Messaging Protocol) implementation, specifically in the handling of streams traversing a Proxy Node. Due to insufficient access control, an unauthenticated attacker can send crafted requests to disconnect active RTMP streams, effectively causing a denial of service by interrupting video or audio streams. The vulnerability does not expose confidential data nor allow modification of stream content, but it impacts the availability of streaming services. The attack vector is network-based (AV:N), with high attack complexity (AC:H), requiring no privileges (PR:N) or user interaction (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are reported in the wild yet. The vulnerability was reserved on 2025-11-28 and published on 2025-12-25. Pexip Infinity is widely used for enterprise video conferencing and streaming, making this vulnerability relevant for organizations relying on these services for communication and collaboration.

Potential Impact

For European organizations, this vulnerability could disrupt critical communication channels, especially in sectors relying heavily on video conferencing such as finance, government, healthcare, and education. The ability of an attacker to disconnect RTMP streams could lead to denial of service during important meetings or broadcasts, causing operational delays and potential reputational damage. Although no data breach or integrity compromise occurs, the availability impact can affect business continuity and remote collaboration efficiency. Organizations using Pexip Infinity Proxy Nodes exposed to untrusted networks are particularly vulnerable. The medium severity rating reflects the limited scope of impact but acknowledges the importance of uninterrupted communication in modern enterprises. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade Pexip Infinity to version 39.0 or later once the patch is released by the vendor. Until then, network-level controls should be enforced to restrict access to Proxy Nodes, limiting exposure to trusted internal networks only. Implementing firewall rules or VPN access can reduce the attack surface. Monitoring RTMP stream stability and logging unusual disconnection events can help detect exploitation attempts. Additionally, organizations should review and harden access control policies around streaming infrastructure and consider segmenting video conferencing components from general network traffic. Regularly updating and patching Pexip Infinity and related components is critical. Engaging with Pexip support for interim mitigations or workarounds is recommended if patching is delayed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694cc81abddd8c7d7f664839

Added to database: 12/25/2025, 5:14:02 AM

Last enriched: 1/1/2026, 10:41:08 PM

Last updated: 2/6/2026, 9:00:52 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats