Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25994: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in pjsip pjproject

0
High
VulnerabilityCVE-2026-25994cvecve-2026-25994cwe-120
Published: Wed Feb 11 2026 (02/11/2026, 20:56:47 UTC)
Source: CVE Database V5
Vendor/Project: pjsip
Product: pjproject

Description

CVE-2026-25994 is a high-severity buffer overflow vulnerability in the PJNATH ICE Session component of the pjsip pjproject library versions 2. 16 and earlier. It occurs when processing credentials with excessively long usernames, leading to a classic buffer overflow due to unchecked input size. The vulnerability can be exploited remotely without authentication or user interaction, potentially allowing attackers to execute arbitrary code or cause denial of service. No known exploits are currently reported in the wild. European organizations using pjsip-based VoIP or multimedia communication systems are at risk, especially those relying on vulnerable versions. Mitigation requires updating to a patched version once available or applying custom input validation and length checks on usernames. Countries with significant telecom infrastructure and VoIP adoption, such as Germany, France, the UK, and the Netherlands, are likely most affected. Given the high CVSS score (8. 1) and the potential for remote exploitation with high impact on confidentiality, integrity, and availability, this vulnerability demands prompt attention from defenders.

AI-Powered Analysis

AILast updated: 02/11/2026, 21:31:05 UTC

Technical Analysis

CVE-2026-25994 is a buffer overflow vulnerability classified under CWE-120 found in the PJNATH ICE Session component of the pjsip pjproject library, versions 2.16 and earlier. PJSIP is a widely used open-source multimedia communication library written in C, commonly employed in VoIP and real-time communication applications. The vulnerability arises when the system processes credentials containing usernames that exceed expected length limits. Due to the lack of proper bounds checking during buffer copy operations, an attacker can supply an excessively long username, causing a buffer overflow. This overflow can overwrite adjacent memory, potentially leading to arbitrary code execution or application crashes. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS v4.0 base score is 8.1, reflecting its high severity, with vector metrics indicating network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the nature of the vulnerability makes it a critical concern for systems using vulnerable pjsip versions. No official patches are listed yet, so mitigation currently relies on defensive coding practices and monitoring for updates from the vendor.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those deploying pjsip-based communication systems in telephony, unified communications, or multimedia conferencing solutions. Exploitation could allow attackers to execute arbitrary code remotely, leading to full compromise of affected systems, data breaches, or denial of service conditions disrupting critical communication services. This could affect confidentiality by exposing sensitive call or user data, integrity by allowing manipulation of communication sessions, and availability by crashing or destabilizing services. Given the widespread use of pjsip in open-source and commercial VoIP products, the scope of affected systems is broad. Disruption of communication infrastructure could have cascading effects on business operations, emergency services, and governmental communications across Europe. The lack of required authentication or user interaction lowers the barrier for attackers, increasing the likelihood of exploitation attempts once a public exploit becomes available.

Mitigation Recommendations

European organizations should immediately inventory their use of pjsip pjproject libraries and identify versions at or below 2.16. Until an official patch is released, organizations should implement strict input validation on usernames and credentials at the application or network boundary to enforce maximum length limits and reject anomalous inputs. Employing network-level protections such as Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block suspiciously long username fields in SIP or related traffic can reduce exposure. Monitoring logs for abnormal authentication attempts with unusually long usernames can provide early warning of exploitation attempts. Organizations should subscribe to vendor advisories and CVE databases to apply patches promptly once available. Additionally, isolating critical communication servers and applying the principle of least privilege can limit the impact of a successful exploit. Conducting penetration testing and code audits focusing on input handling in pjsip components can uncover other potential weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T17:41:55.858Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698cf19f4b57a58fa1cc1c96

Added to database: 2/11/2026, 9:16:15 PM

Last enriched: 2/11/2026, 9:31:05 PM

Last updated: 2/11/2026, 10:35:10 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats