Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34235: CWE-125: Out-of-bounds Read in pjsip pjproject

0
Medium
VulnerabilityCVE-2026-34235cvecve-2026-34235cwe-125
Published: Tue Mar 31 2026 (03/31/2026, 15:36:47 UTC)
Source: CVE Database V5
Vendor/Project: pjsip
Product: pjproject

Description

PJSIP is a free and open source multimedia communication library written in C. Prior to version 2.17, a heap out-of-bounds read vulnerability exists in PJSIP's VP9 RTP unpacketizer that occurs when parsing crafted VP9 Scalability Structure (SS) data. Insufficient bounds checking on the payload descriptor length may cause reads beyond the allocated RTP payload buffer. This issue has been patched in version 2.17. A workaround for this issue involves disabling VP9 codec if not needed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 16:10:02 UTC

Technical Analysis

The vulnerability identified as CVE-2026-34235 affects pjproject, an open-source multimedia communication library widely used for VoIP and real-time communication applications. Specifically, the flaw resides in the VP9 RTP unpacketizer component, which processes RTP packets containing VP9 video codec data. The vulnerability is a heap out-of-bounds read (CWE-125) caused by insufficient validation of the payload descriptor length field when parsing the VP9 Scalability Structure (SS) data. This improper bounds checking allows an attacker to craft malicious RTP packets with malformed VP9 SS data that trigger reads beyond the allocated memory buffer. Such out-of-bounds reads can lead to information disclosure by leaking sensitive memory contents or cause application crashes, potentially resulting in denial of service. The vulnerability requires no authentication or user interaction and can be exploited remotely by sending specially crafted RTP streams to vulnerable endpoints. The issue affects pjproject versions earlier than 2.17 and was addressed by improving bounds checking in the VP9 RTP unpacketizer in version 2.17. As a workaround, disabling the VP9 codec prevents the vulnerable code path from being exercised. No public exploits have been reported to date, but the medium CVSS score of 6.9 reflects the moderate risk due to the ease of remote exploitation and potential impact on confidentiality and availability.

Potential Impact

Organizations using pjproject versions prior to 2.17 with VP9 codec enabled in their communication infrastructure face risks including potential information leakage and service disruption. Attackers can remotely exploit this vulnerability by sending crafted RTP packets, which may lead to disclosure of sensitive memory data or cause application crashes, impacting the availability of real-time communication services such as VoIP, video conferencing, and unified communications. This could degrade user experience, interrupt business operations, and expose sensitive information processed by the affected systems. Since pjproject is embedded in many communication platforms worldwide, the vulnerability could affect a broad range of industries including telecommunications, healthcare, finance, and government sectors that rely on secure multimedia communications. The lack of authentication or user interaction requirements increases the attack surface, making automated or large-scale exploitation feasible if weaponized. However, the absence of known exploits in the wild currently limits immediate widespread impact.

Mitigation Recommendations

To mitigate CVE-2026-34235, organizations should upgrade all instances of pjproject to version 2.17 or later, where the vulnerability has been patched with improved bounds checking. If immediate upgrading is not feasible, disabling the VP9 codec in the affected applications or endpoints will prevent the vulnerable code from being executed, effectively mitigating the risk. Network-level controls such as RTP traffic filtering and anomaly detection can help identify and block suspicious VP9 RTP packets with malformed payloads. Implementing strict input validation and RTP stream integrity checks at the application layer can further reduce exposure. Regularly monitoring vendor advisories and applying security patches promptly is critical. Additionally, organizations should conduct security testing and code audits on custom integrations using pjproject to ensure no other unsafe parsing routines exist. Employing runtime protections like memory safety tools or sandboxing the media processing components can limit the impact of potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-26T16:22:29.034Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cbedf2e6bfc5ba1d2480fd

Added to database: 3/31/2026, 3:53:22 PM

Last enriched: 3/31/2026, 4:10:02 PM

Last updated: 4/1/2026, 3:57:44 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses