Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66443: CWE-617 Reachable Assertion in Pexip Infinity

0
High
VulnerabilityCVE-2025-66443cvecve-2025-66443cwe-617
Published: Thu Dec 25 2025 (12/25/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Pexip
Product: Infinity

Description

Pexip Infinity 35.0 through 38.1 before 39.0, in non-default configurations that use Direct Media for WebRTC, has Improper Input Validation in signalling that allows an attacker to trigger a software abort, resulting in a temporary denial of service.

AI-Powered Analysis

AILast updated: 12/25/2025, 05:14:52 UTC

Technical Analysis

CVE-2025-66443 is a vulnerability classified under CWE-617 (Reachable Assertion) affecting Pexip Infinity versions 35.0 through 38.1 before 39.0. The issue arises in non-default configurations that enable Direct Media for WebRTC, where improper input validation in the signalling protocol allows an attacker to send crafted signalling messages that trigger an assertion failure within the software. This assertion failure causes the Pexip Infinity service to abort unexpectedly, leading to a temporary denial of service condition. The vulnerability can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector, low attack complexity, and no required privileges or user interaction. The impact is limited to availability, with no direct confidentiality or integrity compromise. No public exploits or patches are currently available, though the vendor has reserved the CVE and plans to address it in version 39.0. Pexip Infinity is widely used in enterprise video conferencing and collaboration, particularly in environments leveraging WebRTC for direct media streams, making this vulnerability a significant risk for service continuity.

Potential Impact

For European organizations, the primary impact of CVE-2025-66443 is the potential disruption of real-time communication services relying on Pexip Infinity with Direct Media for WebRTC enabled. This can affect business continuity, especially for sectors dependent on video conferencing for remote work, customer interactions, and collaboration. Temporary denial of service could interrupt meetings, delay decision-making, and degrade user experience. While confidentiality and integrity are not directly affected, the availability impact can indirectly affect operational security and trust. Organizations in finance, government, healthcare, and critical infrastructure sectors are particularly vulnerable due to their reliance on uninterrupted communication channels. The lack of required authentication and ease of exploitation increase the risk of opportunistic attacks or targeted disruptions by threat actors. Additionally, the absence of known exploits in the wild currently provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2025-66443, European organizations should prioritize upgrading Pexip Infinity to version 39.0 or later once the patch is released by the vendor. Until then, disabling the Direct Media feature for WebRTC in the signalling configuration can prevent exploitation by removing the vulnerable code path. Network-level controls such as firewall rules and intrusion detection systems should be configured to monitor and restrict suspicious signalling traffic to Pexip Infinity servers. Implementing rate limiting and anomaly detection on signalling messages can help detect and block attempts to trigger the assertion failure. Organizations should also conduct thorough configuration reviews to ensure non-default settings do not expose unnecessary attack surfaces. Regular backups and failover mechanisms for Pexip services can reduce downtime impact. Finally, maintaining close communication with the vendor for timely updates and applying security advisories promptly is essential.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-01T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694cc4e20921a92379c39d90

Added to database: 12/25/2025, 5:00:18 AM

Last enriched: 12/25/2025, 5:14:52 AM

Last updated: 12/25/2025, 6:31:43 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats