Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28799: CWE-416: Use After Free in pjsip pjproject

0
High
VulnerabilityCVE-2026-28799cvecve-2026-28799cwe-416
Published: Fri Mar 06 2026 (03/06/2026, 06:36:55 UTC)
Source: CVE Database V5
Vendor/Project: pjsip
Product: pjproject

Description

CVE-2026-28799 is a high-severity use-after-free vulnerability in the PJSIP pjproject multimedia communication library versions prior to 2. 17. The flaw exists in the event subscription framework (evsub. c) and is triggered when processing presence unsubscription requests (SUBSCRIBE with Expires=0). Exploiting this vulnerability can lead to heap corruption, potentially allowing remote code execution or denial of service without requiring authentication or user interaction. The issue has been patched in version 2. 17. Organizations using vulnerable versions of pjproject in VoIP or multimedia communication systems should update immediately to mitigate risk. No known exploits are currently reported in the wild, but the low attack complexity and network attack vector make this a critical patch priority. Countries with significant deployment of VoIP infrastructure and open-source telephony stacks are most at risk.

AI-Powered Analysis

AILast updated: 03/06/2026, 07:15:33 UTC

Technical Analysis

CVE-2026-28799 is a use-after-free vulnerability classified under CWE-416 affecting the PJSIP pjproject library, a widely used open-source multimedia communication stack written in C. The vulnerability resides in the event subscription framework component (evsub.c) and is specifically triggered during presence unsubscription operations, i.e., when a SUBSCRIBE request is sent with an Expires header set to zero. This causes the library to free memory prematurely while still referencing it, leading to heap corruption. Because the flaw can be triggered remotely over the network without authentication or user interaction, it poses a significant security risk. The vulnerability affects all pjproject versions prior to 2.17, where it has been patched. The CVSS 4.0 base score is 8.7, indicating high severity, with an attack vector of network, no privileges required, and no user interaction needed. Exploitation could allow attackers to execute arbitrary code or cause denial of service by crashing the affected application. The vulnerability is particularly critical for systems relying on PJSIP for VoIP, SIP-based communication, or multimedia conferencing solutions. Although no known exploits have been reported in the wild yet, the ease of exploitation and potential impact warrant immediate remediation.

Potential Impact

The impact of CVE-2026-28799 is substantial for organizations using pjproject in their communication infrastructure. Successful exploitation can lead to remote code execution, allowing attackers to take control of affected systems, or cause denial of service by crashing services. This threatens confidentiality, integrity, and availability of communication platforms, potentially disrupting business operations, exposing sensitive communications, or enabling further lateral movement within networks. Given the network-exploitable nature and lack of authentication requirements, attackers can target exposed VoIP servers or multimedia gateways directly. This vulnerability could be leveraged in targeted attacks against enterprises, service providers, or government agencies relying on PJSIP-based solutions. The widespread use of pjproject in open-source telephony stacks and embedded devices increases the scope of affected systems globally.

Mitigation Recommendations

To mitigate CVE-2026-28799, organizations should immediately upgrade pjproject to version 2.17 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, apply any available vendor-provided patches or workarounds that disable or restrict the event subscription framework, particularly presence unsubscription features. Network-level mitigations include restricting access to SIP and related ports to trusted sources only, deploying intrusion detection/prevention systems with signatures for suspicious SUBSCRIBE with Expires=0 requests, and monitoring logs for anomalous subscription activity. Additionally, implement network segmentation to isolate VoIP infrastructure from general user networks. Regularly audit and update all telephony and multimedia communication components to ensure they are not running vulnerable versions. Finally, maintain an incident response plan specific to VoIP infrastructure compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-03T14:25:19.245Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69aa7bb0c48b3f10ff245867

Added to database: 3/6/2026, 7:01:04 AM

Last enriched: 3/6/2026, 7:15:33 AM

Last updated: 3/6/2026, 1:58:12 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses