Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26203: CWE-416: Use After Free in pjsip pjmedia-video

0
Medium
VulnerabilityCVE-2026-26203cvecve-2026-26203cwe-416
Published: Thu Feb 19 2026 (02/19/2026, 19:28:58 UTC)
Source: CVE Database V5
Vendor/Project: pjsip
Product: pjmedia-video

Description

PJSIP is a free and open source multimedia communication library. Versions prior to 2.17 have a critical heap buffer underflow vulnerability in PJSIP's H.264 packetizer. The bug occurs when processing malformed H.264 bitstreams without NAL unit start codes, where the packetizer performs unchecked pointer arithmetic that can read from memory located before the allocated buffer. Version 2.17 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 02/19/2026, 21:48:14 UTC

Technical Analysis

CVE-2026-26203 is a use-after-free vulnerability categorized under CWE-416, found in the pjmedia-video module of the PJSIP open-source multimedia communication library. The vulnerability exists in versions prior to 2.17 and is triggered when the H.264 packetizer processes malformed bitstreams that lack NAL unit start codes. Specifically, the packetizer performs unchecked pointer arithmetic, which results in reading memory located before the allocated buffer, causing a heap buffer underflow. This memory mismanagement can lead to undefined behavior such as application crashes, memory corruption, or potentially exploitable conditions depending on the context of use. The vulnerability does not require authentication or user interaction but does require local access (AV:L). The CVSS 4.0 base score is 5.1 (medium severity), reflecting limited attack vector scope but notable impact on stability and integrity. The issue was addressed in PJSIP version 2.17 by adding proper validation and bounds checking to the packetizer code. No public exploits are known, but the flaw poses a risk to any multimedia or VoIP applications relying on vulnerable PJSIP versions for H.264 video stream processing.

Potential Impact

The primary impact of CVE-2026-26203 is on the confidentiality, integrity, and availability of systems using vulnerable versions of PJSIP for multimedia communication. Exploitation can cause application crashes or memory corruption, potentially leading to denial of service or, in some cases, arbitrary code execution if an attacker can carefully craft malformed H.264 streams. This could disrupt VoIP services, video conferencing, or other multimedia applications, affecting business continuity and user experience. Since PJSIP is widely used in embedded devices, softphones, and communication platforms, organizations globally that rely on these technologies could face service outages or security breaches. Although the attack vector is local, compromised internal systems or malicious insiders could exploit this vulnerability. The absence of known exploits reduces immediate risk, but the vulnerability remains a concern for long-term security posture and resilience.

Mitigation Recommendations

Organizations should upgrade all PJSIP deployments to version 2.17 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, applying custom patches or recompiling with added bounds checking in the pjmedia-video H.264 packetizer is recommended. Additionally, implement strict input validation and filtering of H.264 streams before processing to detect and reject malformed packets lacking proper NAL unit start codes. Network segmentation and limiting local access to multimedia processing components can reduce the attack surface. Monitoring logs for crashes or unusual behavior in multimedia applications may help detect exploitation attempts. Finally, maintain an inventory of all products and devices using PJSIP to ensure comprehensive coverage of the patching process.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-11T19:56:24.814Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69978157d7880ec89b349797

Added to database: 2/19/2026, 9:32:07 PM

Last enriched: 2/19/2026, 9:48:14 PM

Last updated: 2/21/2026, 12:22:21 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats