Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66443: CWE-617 Reachable Assertion in Pexip Infinity

0
High
VulnerabilityCVE-2025-66443cvecve-2025-66443cwe-617
Published: Thu Dec 25 2025 (12/25/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Pexip
Product: Infinity

Description

CVE-2025-66443 is a high-severity vulnerability in Pexip Infinity versions 35. 0 through 38. 1 prior to 39. 0, affecting non-default configurations that use Direct Media for WebRTC. It involves improper input validation in the signalling component, allowing an unauthenticated remote attacker to trigger a reachable assertion failure that causes the software to abort. This results in a temporary denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires no user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild. European organizations using Pexip Infinity for video conferencing with Direct Media enabled are at risk.

AI-Powered Analysis

AILast updated: 01/01/2026, 22:41:36 UTC

Technical Analysis

CVE-2025-66443 is a vulnerability classified under CWE-617 (Reachable Assertion) found in Pexip Infinity versions 35.0 through 38.1 before 39.0. The issue arises in non-default configurations that enable Direct Media for WebRTC, a feature that allows media streams to be sent directly between endpoints rather than routed through a central server. The vulnerability is due to improper input validation in the signalling process, which is responsible for establishing and managing WebRTC sessions. An attacker can send specially crafted signalling messages that trigger an assertion failure within the software. Assertions are sanity checks in code that, when failed, cause the program to abort to prevent further damage or undefined behavior. In this case, the assertion failure leads to a software abort, resulting in a temporary denial of service by crashing or stopping the affected service. The vulnerability can be exploited remotely without authentication or user interaction, making it relatively easy for attackers to disrupt service availability. Although the vulnerability does not compromise confidentiality or integrity, the denial of service impact can disrupt critical video conferencing and communication services. No public exploits have been reported yet, but the CVSS v3.1 base score of 7.5 reflects the high impact on availability and ease of exploitation. The vulnerability was reserved on December 1, 2025, and published on December 25, 2025. Pexip Infinity is widely used in enterprise and government sectors for secure video conferencing, making this vulnerability significant for organizations relying on real-time communications.

Potential Impact

The primary impact of CVE-2025-66443 is a denial of service condition affecting the availability of Pexip Infinity video conferencing services. For European organizations, this can disrupt critical communication channels used for remote collaboration, virtual meetings, and secure conferencing, especially in sectors such as government, healthcare, finance, and large enterprises. Temporary service outages can lead to operational delays, reduced productivity, and potential reputational damage. Since the vulnerability can be exploited remotely without authentication, attackers can cause service interruptions at scale or target specific organizations. The lack of impact on confidentiality and integrity limits risks related to data breaches or manipulation, but availability disruptions in communication infrastructure can indirectly affect business continuity and incident response capabilities. Organizations using non-default Direct Media configurations are specifically at risk, which may include setups optimized for performance or compliance with certain network policies. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.

Mitigation Recommendations

To mitigate CVE-2025-66443, organizations should promptly upgrade Pexip Infinity to version 39.0 or later, where the vulnerability has been addressed. If immediate upgrade is not feasible, review and consider disabling the non-default Direct Media configuration for WebRTC to prevent exposure to the vulnerable code path. Network-level protections such as firewall rules and intrusion detection/prevention systems should be configured to monitor and restrict suspicious signalling traffic to the Pexip Infinity servers. Implement strict access controls and network segmentation to limit exposure of the conferencing infrastructure to untrusted networks. Regularly monitor system logs and service health indicators for signs of crashes or abnormal terminations that may indicate exploitation attempts. Engage with Pexip support and subscribe to security advisories for updates on patches and recommended configurations. Additionally, conduct internal security assessments and penetration tests focusing on WebRTC signalling to identify potential weaknesses. Document and rehearse incident response procedures to quickly recover from potential denial of service incidents affecting communication services.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-01T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694cc4e20921a92379c39d90

Added to database: 12/25/2025, 5:00:18 AM

Last enriched: 1/1/2026, 10:41:36 PM

Last updated: 2/6/2026, 12:00:55 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats