Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68274: CWE-476: NULL Pointer Dereference in emiago sipgo

0
High
VulnerabilityCVE-2025-68274cvecve-2025-68274cwe-476cwe-755
Published: Tue Dec 16 2025 (12/16/2025, 22:02:55 UTC)
Source: CVE Database V5
Vendor/Project: emiago
Product: sipgo

Description

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 12/16/2025, 22:24:04 UTC

Technical Analysis

The vulnerability CVE-2025-68274 resides in the emiago sipgo library, a Go language library for building SIP (Session Initiation Protocol) services. Specifically, the issue is a null pointer dereference in the NewResponseFromRequest function, which is responsible for generating SIP responses based on incoming SIP requests. The root cause is that the function assumes the presence of the To header in SIP requests without verifying its existence. When a SIP request is received without a To header—a mandatory header in SIP messages—the parsing succeeds but the response creation code dereferences a nil pointer, leading to a crash of the SIP application. This vulnerability affects all normal SIP operations, including call setup, authentication, and message handling, not just error or edge cases. Since the vulnerability can be triggered by sending a single malformed SIP request remotely, it allows unauthenticated attackers to cause a denial-of-service (DoS) condition by crashing SIP applications that use the vulnerable sipgo library versions (>= 0.3.0 and < 1.0.0-alpha-1). The vulnerability has a CVSS 4.0 score of 8.7 (high severity), reflecting its network attack vector, no required privileges or user interaction, and high impact on availability. The issue is patched in version 1.0.0-alpha-1 of sipgo. No known exploits are reported in the wild yet, but the simplicity of exploitation and the critical role of SIP in telecommunications make this a significant threat.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the availability and reliability of SIP-based communication services, which are widely used in VoIP telephony, unified communications, and enterprise telephony systems. A successful exploitation can cause immediate denial of service by crashing SIP servers or applications, disrupting voice calls, video conferencing, and authentication processes. This can affect business continuity, customer service, and internal communications. Telecom providers, enterprises with on-premises SIP infrastructure, and cloud SIP service providers are particularly vulnerable. The disruption could also impact emergency services and critical infrastructure relying on SIP communications. Additionally, the ease of exploitation without authentication increases the risk of widespread attacks, potentially targeting multiple organizations simultaneously. The vulnerability could be leveraged as part of larger multi-vector attacks or to create service outages during geopolitical tensions or cyber campaigns targeting European telecom infrastructure.

Mitigation Recommendations

The primary mitigation is to upgrade all affected sipgo library instances to version 1.0.0-alpha-1 or later, where the null pointer dereference issue is patched. Organizations should audit their SIP applications and services to identify usage of sipgo versions in the vulnerable range. Implement strict input validation and SIP message integrity checks to detect and reject malformed SIP requests lacking mandatory headers such as To. Deploy network-level protections such as SIP-aware firewalls and intrusion prevention systems (IPS) that can filter malformed SIP traffic and rate-limit suspicious requests. Monitoring and alerting on SIP service crashes or abnormal SIP traffic patterns can provide early detection of exploitation attempts. For critical deployments, consider redundancy and failover mechanisms to maintain service availability during attacks. Engage with vendors and developers to ensure timely patching and secure coding practices in SIP service development.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-16T14:05:31.364Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6941da4bb8ff87d8f94579f1

Added to database: 12/16/2025, 10:16:43 PM

Last enriched: 12/16/2025, 10:24:04 PM

Last updated: 12/17/2025, 4:11:28 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats