Pexip security bulletins
The following security bulletins are published by Pexip for issues affecting our own products — Pexip Infinity, the Pexip Connect apps, the VMR self-service portal, and Enhanced Room Management. There are currently no security bulletins for any other Pexip products, including the Reverse Proxy and TURN Server, Pexip Justice, or AIMS.
For information about external issues arising in third-party software and operating systems that may impact these Pexip products, see https://www.pexip.com/trust-center. Where relevant, updates will be incorporated into each Pexip product, so we recommend that you frequently check for and always run the latest versions of each product. If you have deployed Pexip's VMR self-service portal, Reverse Proxy and TURN Server, Pexip Justice or AIMS products, you should also ensure that the appliance's operating system is regularly patched against the latest security bugs.
More information specific for each of the vulnerabilities can be found via the NIST National Vulnerability Database: http://nvd.nist.gov/.
Pexip Infinity
This list covers issues addressed in Pexip Infinity v34.0 and later. For issues addressed in v33.x or earlier, see our documentation for previous releases.
Each bulletin addresses a number of vulnerabilities in the operating system software used by Pexip Infinity. The bulletins include an assessment of the issues, the impact to the Pexip Infinity platform, and resolution details.
In the table below, "Severity" reflects the severity of the issue as calculated from the CVSS Base Score. "Risk" reflects the risk associated with each vulnerability in the context of the Pexip Infinity product environment.
Reference | Description | Severity | Risk | Updated | Impacted versions | Addressed in version |
---|---|---|---|---|---|---|
Multiple | Resolved minor issues: CVE-2023-3019, CVE-2023-3301, CVE-2023-52596, CVE-2023-52619, CVE-2023-52621, CVE-2023-52622, CVE-2023-52889, CVE-2023-6683, CVE-2024-2004, CVE-2024-2398, CVE-2024-24789, CVE-2024-2511, CVE-2024-26327, CVE-2024-26328, CVE-2024-26581, CVE-2024-26601, CVE-2024-26602, CVE-2024-26603, CVE-2024-26621, CVE-2024-26622, CVE-2024-26626, CVE-2024-26627, CVE-2024-26640, CVE-2024-26641, CVE-2024-26642, CVE-2024-26643, CVE-2024-26665, CVE-2024-26671, CVE-2024-26673, CVE-2024-26676, CVE-2024-26679, CVE-2024-26687, CVE-2024-26688, CVE-2024-26698, CVE-2024-26704, CVE-2024-26718, CVE-2024-26720, CVE-2024-26731, CVE-2024-26733, CVE-2024-26735, CVE-2024-26737, CVE-2024-26739, CVE-2024-26740, CVE-2024-26759, CVE-2024-26760, CVE-2024-26761, CVE-2024-26763, CVE-2024-26764, CVE-2024-26769, CVE-2024-26772, CVE-2024-26773, CVE-2024-26774, CVE-2024-26775, CVE-2024-26782, CVE-2024-26783, CVE-2024-26798, CVE-2024-26803, CVE-2024-26804, CVE-2024-26805, CVE-2024-26809, CVE-2024-26810, CVE-2024-26812, CVE-2024-26815, CVE-2024-26816, CVE-2024-26835, CVE-2024-26840, CVE-2024-26844, CVE-2024-26845, CVE-2024-26851, CVE-2024-26852, CVE-2024-26857, CVE-2024-26862, CVE-2024-26865, CVE-2024-26878, CVE-2024-26880, CVE-2024-26882, CVE-2024-26883, CVE-2024-26884, CVE-2024-26885, CVE-2024-26891, CVE-2024-26894, CVE-2024-26898, CVE-2024-26900, CVE-2024-26901, CVE-2024-26906, CVE-2024-26907, CVE-2024-26920, CVE-2024-26921, CVE-2024-26923, CVE-2024-26924, CVE-2024-26925, CVE-2024-26935, CVE-2024-26953, CVE-2024-26960, CVE-2024-26976, CVE-2024-26983, CVE-2024-26987, CVE-2024-26988, CVE-2024-26992, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27015, CVE-2024-27016, CVE-2024-27019, CVE-2024-27020, CVE-2024-27022, CVE-2024-27024, CVE-2024-27047, CVE-2024-27065, CVE-2024-27389, CVE-2024-27393, CVE-2024-27403, CVE-2024-27415, CVE-2024-27437, CVE-2024-31076, CVE-2024-3447, CVE-2024-35255, CVE-2024-35803, CVE-2024-35860, CVE-2024-35875, CVE-2024-35904, CVE-2024-35929, CVE-2024-35939, CVE-2024-35945, CVE-2024-35947, CVE-2024-35961, CVE-2024-35974, CVE-2024-35995, CVE-2024-36000, CVE-2024-36017, CVE-2024-36028, CVE-2024-36244, CVE-2024-36270, CVE-2024-36286, CVE-2024-36489, CVE-2024-36881, CVE-2024-36882, CVE-2024-36883, CVE-2024-36889, CVE-2024-36890, CVE-2024-36891, CVE-2024-36901, CVE-2024-36902, CVE-2024-36903, CVE-2024-36904, CVE-2024-36905, CVE-2024-36908, CVE-2024-36909, CVE-2024-36910, CVE-2024-36911, CVE-2024-36912, CVE-2024-36913, CVE-2024-36916, CVE-2024-36917, CVE-2024-36918, CVE-2024-36927, CVE-2024-36929, CVE-2024-36933, CVE-2024-36938, CVE-2024-36971, CVE-2024-36974, CVE-2024-36978, CVE-2024-36979, CVE-2024-37356, CVE-2024-37370, CVE-2024-37371, CVE-2024-37568, CVE-2024-38538, CVE-2024-38555, CVE-2024-38556, CVE-2024-38557, CVE-2024-38564, CVE-2024-38576, CVE-2024-38577, CVE-2024-38580, CVE-2024-38586, CVE-2024-38588, CVE-2024-38596, CVE-2024-38598, CVE-2024-38601, CVE-2024-38612, CVE-2024-38615, CVE-2024-38627, CVE-2024-39276, CVE-2024-39298, CVE-2024-39329, CVE-2024-39330, CVE-2024-39371, CVE-2024-39474, CVE-2024-39476, CVE-2024-39482, CVE-2024-39487, CVE-2024-39489, CVE-2024-39490, CVE-2024-39494, CVE-2024-39499, CVE-2024-39500, CVE-2024-39501, CVE-2024-39508, CVE-2024-39509, CVE-2024-39614, CVE-2024-40900, CVE-2024-40905, CVE-2024-40906, CVE-2024-40908, CVE-2024-40914, CVE-2024-40919, CVE-2024-40931, CVE-2024-40935, CVE-2024-40937, CVE-2024-40938, CVE-2024-40945, CVE-2024-40947, CVE-2024-40953, CVE-2024-40954, CVE-2024-40957, CVE-2024-40958, CVE-2024-40959, CVE-2024-40960, CVE-2024-40961, CVE-2024-40966, CVE-2024-40972, CVE-2024-40980, CVE-2024-40982, CVE-2024-40984, CVE-2024-40990, CVE-2024-40995, CVE-2024-40997, CVE-2024-40998, CVE-2024-41000, CVE-2024-41001, CVE-2024-41005, CVE-2024-41007, CVE-2024-41009, CVE-2024-41012, CVE-2024-41020, CVE-2024-41027, CVE-2024-41031, CVE-2024-41040, CVE-2024-41041, CVE-2024-41042, CVE-2024-41048, CVE-2024-41049, CVE-2024-41050, CVE-2024-41057, CVE-2024-41058, CVE-2024-41073, CVE-2024-41077, CVE-2024-41079, CVE-2024-41081, CVE-2024-41090, CVE-2024-41091, CVE-2024-41096, CVE-2024-41098, CVE-2024-41989, CVE-2024-41991, CVE-2024-42005, CVE-2024-42063, CVE-2024-42067, CVE-2024-42068, CVE-2024-42080, CVE-2024-42098, CVE-2024-42106, CVE-2024-42131, CVE-2024-42135, CVE-2024-42136, CVE-2024-42145, CVE-2024-42152, CVE-2024-42154, CVE-2024-42159, CVE-2024-42229, CVE-2024-42232, CVE-2024-42239, CVE-2024-42241, CVE-2024-42243, CVE-2024-42245, CVE-2024-42247, CVE-2024-42265, CVE-2024-42268, CVE-2024-42269, CVE-2024-42270, CVE-2024-42276, CVE-2024-42281, CVE-2024-42283, CVE-2024-42285, CVE-2024-42292, CVE-2024-42302, CVE-2024-42304, CVE-2024-42305, CVE-2024-42306, CVE-2024-42312, CVE-2024-42315, CVE-2024-42316, CVE-2024-42318, CVE-2024-42321, CVE-2024-42322, CVE-2024-4317, CVE-2024-43817, CVE-2024-43828, CVE-2024-43834, CVE-2024-43837, CVE-2024-43853, CVE-2024-43854, CVE-2024-43856, CVE-2024-43866, CVE-2024-43869, CVE-2024-43870, CVE-2024-43871, CVE-2024-43873, CVE-2024-43882, CVE-2024-43889, CVE-2024-43890, CVE-2024-43892, CVE-2024-43893, CVE-2024-43914, CVE-2024-44934, CVE-2024-44940, CVE-2024-44944, CVE-2024-44946, CVE-2024-44947, CVE-2024-45490, CVE-2024-4603, CVE-2024-4741, CVE-2024-6119, CVE-2024-8008 | November 2024 | 36.0 | |||
CVE-2024-37917 |
Insufficient input validation in the signalling implementation(s) allows a remote attacker to trigger a software abort resulting in a denial of service. CVSS3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Discussion: A crafted signalling message allows a remote attacker to trigger a software abort. Mitigation: None Resolution: Upgrade to Pexip Infinity v35.0 |
High | High | July 2024 | All before 35.0 | 35.0 |
Multiple | Resolved minor issues: CVE-2021-22959, CVE-2021-22960, CVE-2021-44532, CVE-2021-44533, CVE-2022-0597, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215, CVE-2022-3523, CVE-2022-35256, CVE-2022-3567, CVE-2023-1637, CVE-2023-30588, CVE-2023-3161, CVE-2023-39326, CVE-2023-4459, CVE-2023-48795, CVE-2023-48795, CVE-2023-52435, CVE-2023-52458, CVE-2024-0450, CVE-2024-27086, CVE-2024-28102, CVE-2024-28219, CVE-2024-29992, CVE-2024-35255, CVE-2023-50387, CVE-2023-50868, CVE-2024-34397, CVE-2024-2961, CVE-2022-4864, CVE-2024-32487, CVE-2024-24806, CVE-2024-2511, CVE-2024-4603, CVE-2024-4741, CVE-2023-28405, CVE-2023-6597, CVE-2024-28085, CVE-2022-3566, CVE-2023-3640, CVE-2023-4387, CVE-2023-52452, CVE-2023-52476, CVE-2023-52492, CVE-2023-52498, CVE-2024-26589 | July 2024 | 35.0 | |||
CVE-2024-6387 |
A race condition was found in OpenSSH's server. If a client does not authenticate within 120 seconds then sshd's SIGALRM handler is called asynchronously and calls various functions that are not async-signal-safe. An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary code with root privileges. CVSS3.1 base score: 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) Discussion: Exploitation of this vulnerability requires an attacker to sustain a large number of connection attempts for a long time (in the original report, which documents an attack on a 32bit architecture, up to 8 hours of attempts were required for a successful exploit). Pexip Infinity runs on a 64bit architecture where the attack is believed to be possible, but where the attack would have to be sustained for several days before success. From version 27, Pexip Infinity further limits connection attempts to a rate lower than that used in the documented attack. While this will not prevent a successful attack, it will slow an attacker down, thus increasing likelihood of detection as the attack would have to be sustained for longer before success is achieved. Mitigation: Ensure SSH access to Infinity nodes is restricted to trusted networks and/or disable SSH using the Management Web Interface. Resolution: Upgrade to Pexip Infinity v34.2 or later |
High | High | July 2024 | 26 ‑ 34.1 | 34.2 |
CVE-2024-33850 |
Incomplete access control checks for participants in the waiting room of a locked conference exposes conference information and may allow these participants to perform actions on the conference. CVSS3.1 base score: 7.6 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L) Discussion: When a conference is locked, participants attempting to join the meeting will be authenticated according to the configured conference access policy and then placed into a waiting room until explicitly admitted by an existing conference host participant. It is possible for participants in the waiting room to obtain the conference roster list and to perform actions on the conference according to the role they would possess after being admitted to the meeting. Mitigation: There is no mitigation available to prevent exposure of the conference roster list to waiting room participants. Minimise the actions available to a waiting room participant by ensuring that locked conferences have a Host PIN configured (or require strong authentication using Identify Providers) so that waiting room participants will only have Guest permissions. Resolution: Upgrade to Pexip Infinity v34.1 or later |
High | High | 4 ‑ 34.0 | 34.1 | |
CVE-2023-34058 |
VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges CVSS3.1 base score: 7.5 (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) Discussion: Exploitation of this vulnerability requires that the VMware administrator has issued SAML SSO credentials for a user to perform VM Guest Operations and to also have assigned one or more Guest Aliases to the Infinity virtual machines. Mitigation: Pexip neither recommends, nor supports, the assignment of Guest Aliases to Infinity virtual machines. Ensure that no Guest Aliases have been inadvertently assigned to Infinity virtual machines: https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html Resolution: Upgrade to Pexip Infinity v34.0 or later |
High | High | March 2024 | All before 34.0 | 34.0 |
Multiple | Resolved minor issues: CVE-2016-10744, CVE-2023-4911, CVE-2023-44487, CVE-2023-45284, CVE-2023-46218, CVE-2023-46219, CVE-2023-5363, CVE-2023-5678, CVE-2023-6237, CVE-2023-6780, CVE-2024-0727 | March 2024 | 34.0 |
Connect apps
Each bulletin addresses a number of vulnerabilities in the software used by the Connect apps. The bulletins include an assessment of the issues, the impact on the Connect app, and resolution details.
VMR self-service portal
Each bulletin addresses a number of vulnerabilities in the software used by the VMR self-service portal. The bulletins include an assessment of the issues, the impact on the VMR portal, and resolution details.
Enhanced Room Management
Each bulletin addresses a number of vulnerabilities in the software used by ERM. The bulletins include an assessment of the issues, the impact on the VMR portal, and resolution details.