Pexip security bulletins
The following security bulletins are published by Pexip for issues affecting Pexip Infinity and Infinity Connect.
Please contact your Pexip authorized support representative for more information about these issues. This list covers issues addressed in v25.0 and later. For issues addressed in v24.x and earlier, see our documentation for previous releases.
More information specific for each of the vulnerabilities can be found via the NIST National Vulnerability Database: http://nvd.nist.gov/.
Pexip Infinity
Each bulletin addresses a number of vulnerabilities in the operating system software used by Pexip Infinity. The bulletins include an assessment of the issues, the impact to the Pexip Infinity platform, and resolution details.
Bulletin | Description | Risk | Updated | Impacted versions | Addressed in version |
---|---|---|---|---|---|
CVE-2022-32956 | Improper access control in the Infinity Management API allows a malicious attacker to escalate privileges when certificate based authentication is enabled. | High | December 2022 | 5.5 - 27.3 | 27.4 |
CVE-2022-27937 |
Insufficient input validation in the H.264 codec implementation allows an unauthenticated remote attacker to trigger excess resource consumption leading to a software abort and denial of service. |
High | March 2022 | 1.0 - 27.2 | 27.3 |
CVE-2022-27935 | Insufficient input validation in the Epic Telehealth implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service. | High | March 2022 | 25.0 - 27.2 | 27.3 |
CVE-2022-27934 |
Insufficient input validation in the Hypertext Transfer Protocol implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service. |
High | March 2022 | 25.0 - 27.2 | 27.3 |
CVE-2022-27933 | Insufficient input validation in the One Touch Join service allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service. In certain circumstances, the attacker is also able to enumerate OTJ endpoint usernames. | High | March 2022 | 24.0 - 27.2 | 27.3 |
CVE-2022-27932 | Insufficient input validation in the One Touch Join service allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service. | High | March 2022 | 24.0 - 27.2 | 27.3 |
CVE-2022-27931 |
Insufficient input validation in the Session Initiation Protocol implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service. |
High | March 2022 | 24.0 - 27.2 | 27.3 |
CVE-2022-27930 |
Insufficient input validation in the Single Sign On implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service. |
High | March 2022 | 27.0 - 27.2 | 27.3 |
CVE-2022-27929 |
Insufficient input validation in the Hypertext Transfer Protocol implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service. |
High | March 2022 | 27.0 - 27.2 | 27.3 |
CVE-2022-27928 | Insufficient input validation in the Session Initiation Protocol implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service. | High | March 2022 | 27.0 - 27.2 | 27.3 |
CVE-2022-26657 | Insufficient input validation in the One Touch Join service allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service. | High | March 2022 | 24.0 - 27.2 | 27.3 |
CVE-2022-26656 |
Insufficient input validation in the One Touch Join service allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service. In certain circumstances, the attacker is also able to enumerate OTJ endpoint usernames. |
High | March 2022 | 24.0 - 27.2 | 27.3 |
CVE-2022-26655 | Missing logic in the Infinity Client API implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service. | High | March 2022 | 27.0 - 27.2 | 27.3 |
CVE-2022-26654 |
Missing logic in the Hypertext Transfer Protocol implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service. |
High |
March 2022 | 24.0 - 27.2 | 27.3 |
CVE-2022-22720 |
Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling. |
Critical | March 2022 | 1 - 27.2 | 27.3 |
CVE-2022-0778 | OpenSSL 1.0.2zc and earlier can be forced into an infinite loop by crafting a certificate containing invalid elliptic curve parameters, allowing an attacker to trigger a denial of service. | High | March 2022 | 1 - 27.2 | 27.3 |
Multiple | Resolved minor issues: CVE-2022-22719, CVE-2022-22721, CVE-2022-23943 | March 2022 | 27.3 | ||
CVE-2022-25357 | Insufficient authorization checks in the call join implementation under certain circumstances allows a window where an unauthenticated remote attacker could join a locked but not PIN-protected conference. | High | February 2022 | 27.0, 27.1 | 27.2 |
CVE-2021-20322 | A weakness when handling ICMP errors in the Linux kernel could allow a remote attacker to defeat UDP source port randomization. | High | January 2022 | 1 - 26.2 | 27.0 |
CVE-2021-33909 | The Linux kernel filesystem implementation contained a flaw which could allow an unprivileged local user to cause a denial of service or escalate privileges. | High | January 2022 | 13.0 - 26.2 | 27.0 |
CVE-2021-41073 | The io_uring implementation in the Linux kernel contained a flaw which could allow an unprivileged local user to escalate privileges. | High | January 2022 | 26.x | 27.0 |
CVE-2021-3712 | Parts of the OpenSSL toolkit assumed that ASN.1 string data was stored with a NUL terminator. An attacker able to cause an application to call a vulnerable function with non-terminated data could cause a denial of service, or possible information disclosure. | High | January 2022 | 1 - 26.2 | 27.0 |
Multiple | Resolved minor issues: CVE-2020-21913, CVE-2020-26541, CVE-2021-0920, CVE-2021-0941, CVE-2021-20321, CVE-2021-22918, CVE-2021-25219, CVE-2021-28153, CVE-2021-33098, CVE-2021-33624, CVE-2021-33910, CVE-2021-34556, CVE-2021-35477, CVE-2021-3655, CVE-2021-3679, CVE-2021-37750, CVE-2021-38198, CVE-2021-38209, CVE-2021-39656, CVE-2021-39657, CVE-2021-4002 | January 2022 | 27.0 | ||
CVE-2022-23228 | Insufficient input validation in the WebRTC implementation allows an unauthenticated remote attacker to cause excessive resource usage leading to a temporary loss of service. | High | January 2022 | 1 - 26.x | 27.0 |
CVE-2021-42555 | Insufficient input validation in the in call setup implementation allows an unauthenticated remote attacker to cause a software abort leading to a temporary loss of service. | High | November 2021 | 25.0 - 26.1 | 26.2 |
CVE-2021-41773 | A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased paths, this could allow for remote code execution. | Medium | November 2021 | 26.1 | 26.2 |
CVE-2021-42013 | It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased paths, this could allow for remote code execution. | Medium | November 2021 | 26.1 | 26.2 |
CVE-2021-34798 | Malformed requests may cause the Apache web server to dereference a NULL pointer resulting in a denial of service. | High | September 2021 | 1 - 26.0 | 26.1 |
CVE-2021-39275 | The ap_escape_quotes() function in the Apache httpd may write beyond the end of a buffer when given malicious input. | High | September 2021 | 1 - 26.0 | 26.1 |
CVE-2021-40438 | A crafted HTTP request can cause the proxy module of Apache httpd to forward the request to an origin server chosen by the attacker. | Critical | September 2021 | 1 - 26.0 | 26.1 |
CVE-2021-32545 | Incomplete input validation in the RTMP implementation allows an unauthenticated remote attacker to cause a denial of service. | High | July 2021 | 7 - 25.4 | 26.0 |
CVE-2021-33498 | Incomplete input validation in the H.264 implementation allows an unauthenticated remote attacker to cause a denial of service. | High | July 2021 | 1 - 25.4 | 26.0 |
CVE-2021-33499 | Incomplete input validation in the H.264 implementation allows an unauthenticated remote attacker to cause a denial of service. | High | July 2021 | 1 - 25.4 | 26.0 |
CVE-2021-35969 | Insufficient input validation in the in call setup implementation allows an unauthenticated remote attacker to cause a software abort leading to a temporary loss of service. | High | July 2021 | 22.0 - 25.4 | 26.0 |
Multiple | Resolved minor issues: CVE-2018-1311, CVE-2018-12929, CVE-2018-12930, CVE-2018-12931, CVE-2019-12881, CVE-2019-16089, CVE-2019-17567, CVE-2019-19070, CVE-2019-19083, CVE-2019-19318, CVE-2019-19378, CVE-2019-20367, CVE-2019-20446, CVE-2019-20908, CVE-2020-0444, CVE-2020-0465, CVE-2020-0466, CVE-2020-0543, CVE-2020-8169, CVE-2020-8177, CVE-2020-8231, CVE-2020-8284, CVE-2020-8285, CVE-2020-8286, CVE-2020-8625, CVE-2020-10135, CVE-2020-11725, CVE-2020-12363, CVE-2020-12364, CVE-2020-13938, CVE-2020-13950, CVE-2020-14372, CVE-2020-15780, CVE-2020-16120, CVE-2020-24977, CVE-2020-25632, CVE-2020-25639, CVE-2020-25647, CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673, CVE-2020-26116, CVE-2020-26262, CVE-2020-27066, CVE-2020-27068, CVE-2020-27170, CVE-2020-27171, CVE-2020-27350, CVE-2020-27749, CVE-2020-27779, CVE-2020-27783, CVE-2020-27786, CVE-2020-27815, CVE-2020-27820, CVE-2020-27825, CVE-2020-27830, CVE-2020-27835, CVE-2020-28374, CVE-2020-28493, CVE-2020-28588, CVE-2020-28941, CVE-2020-29374, CVE-2020-29534, CVE-2020-29568, CVE-2020-29569, CVE-2020-29660, CVE-2020-29661, CVE-2020-35452, CVE-2020-35492, CVE-2020-35499, CVE-2020-35508, CVE-2020-35519, CVE-2020-36158, CVE-2020-36221, CVE-2020-36222, CVE-2020-36223, CVE-2020-36224, CVE-2020-36225, CVE-2020-36226, CVE-2020-36227, CVE-2020-36228, CVE-2020-36229, CVE-2020-36230, CVE-2020-36310, CVE-2020-36311, CVE-2020-36312, CVE-2020-36313, CVE-2020-36322, CVE-2020-36385, CVE-2021-0342, CVE-2021-0512, CVE-2021-0605, CVE-2021-3177, CVE-2021-3178, CVE-2021-3347, CVE-2021-3348, CVE-2021-3411, CVE-2021-3428, CVE-2021-3444, CVE-2021-3483, CVE-2021-3489, CVE-2021-3490, CVE-2021-3491, CVE-2021-3501, CVE-2021-3506, CVE-2021-3516, CVE-2021-3517, CVE-2021-3518, CVE-2021-3520, CVE-2021-3537, CVE-2021-3541, CVE-2021-20177, CVE-2021-20194, CVE-2021-20225, CVE-2021-20226, CVE-2021-20233, CVE-2021-20239, CVE-2021-20261, CVE-2021-20265, CVE-2021-20268, CVE-2021-20292, CVE-2021-22876, CVE-2021-22890, CVE-2021-23133, CVE-2021-23134, CVE-2021-23839, CVE-2021-23840, CVE-2021-23841, CVE-2021-25214, CVE-2021-25215, CVE-2021-25216, CVE-2021-25217, CVE-2021-26690, CVE-2021-26691, CVE-2021-26930, CVE-2021-26931, CVE-2021-26932, CVE-2021-27212, CVE-2021-27218, CVE-2021-27219, CVE-2021-27363, CVE-2021-27364, CVE-2021-27365, CVE-2021-28038, CVE-2021-28039, CVE-2021-28041, CVE-2021-28153, CVE-2021-28375, CVE-2021-28660, CVE-2021-28688, CVE-2021-28950, CVE-2021-28951, CVE-2021-28952, CVE-2021-28957, CVE-2021-28964, CVE-2021-28971, CVE-2021-29154, CVE-2021-29155, CVE-2021-29265, CVE-2021-29266, CVE-2021-29646, CVE-2021-29647, CVE-2021-29649, CVE-2021-29650, CVE-2021-29657, CVE-2021-30002, CVE-2021-30178, CVE-2021-30641, CVE-2021-31440, CVE-2021-31535, CVE-2021-31618, CVE-2021-31829, CVE-2021-31870, CVE-2021-31871, CVE-2021-31872, CVE-2021-31873, CVE-2021-31916, CVE-2021-33033, CVE-2021-33200, CVE-2021-33560 | July 2021 | 26.0 | ||
CVE-2021-31925 | Incomplete input validation in the administrative web interface allows an unauthenticated remote attacker to cause a denial of service. | High | May 2021 | 25.0 - 25.3 | 25.4 |
CVE-2021-3156 | Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character. | Low | February 2021 | 1 - 25.0 | 25.1 |
CVE-2020-25705 |
A flaw in the way reply ICMP packets are limited in the Linux kernel functionality was found that allows to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well. Resolved minor issues: CVE-2017-18258, CVE-2018-1152, CVE-2018-14404, CVE-2018-14498, CVE-2018-14567, CVE-2019-0146, CVE-2019-0147, CVE-2019-0148, CVE-2019-0149, CVE-2019-16168, CVE-2019-18808, CVE-2019-18885, CVE-2019-19036, CVE-2019-19039, CVE-2019-19054, CVE-2019-19067, CVE-2019-19072, CVE-2019-19073, CVE-2019-19082, CVE-2019-19462, CVE-2019-19813, CVE-2019-19956, CVE-2019-20388, CVE-2019-20806, CVE-2019-20810, CVE-2019-20811, CVE-2019-20812, CVE-2019-20934, CVE-2020-0305, CVE-2020-0427, CVE-2020-10177, CVE-2020-10378, CVE-2020-10711, CVE-2020-10732, CVE-2020-10751, CVE-2020-10766, CVE-2020-10767, CVE-2020-10768, CVE-2020-10769, CVE-2020-10781, CVE-2020-10878, CVE-2020-12049, CVE-2020-12352, CVE-2020-12656, CVE-2020-12723, CVE-2020-12768, CVE-2020-12771, CVE-2020-12797, CVE-2020-12826, CVE-2020-12888, CVE-2020-13143, CVE-2020-13434, CVE-2020-13435, CVE-2020-13632, CVE-2020-14308, CVE-2020-14309, CVE-2020-14310, CVE-2020-14311, CVE-2020-14314, CVE-2020-14331, CVE-2020-14344, CVE-2020-14363, CVE-2020-14381, CVE-2020-14385, CVE-2020-14390, CVE-2020-14416, CVE-2020-14422, CVE-2020-15358, CVE-2020-15393, CVE-2020-15436, CVE-2020-15437, CVE-2020-15706, CVE-2020-15707, CVE-2020-15999, CVE-2020-16166, CVE-2020-1968, CVE-2020-1971, CVE-2020-25211, CVE-2020-25284, CVE-2020-25285, CVE-2020-25641, CVE-2020-25656, CVE-2020-25704, CVE-2020-26088, CVE-2020-27675, CVE-2020-28196, CVE-2020-28915, CVE-2020-28974, CVE-2020-29368, CVE-2020-29370, CVE-2020-29371, CVE-2020-7595, CVE-2020-7676, CVE-2020-7955, CVE-2020-8492, CVE-2020-8619, CVE-2020-8622, CVE-2020-8624, CVE-2020-8694 |
High | January 2021 | 13 - 24.3 | 25.0 |
CVE-2022-32956: Improper access control in the Infinity Management API allows a malicious attacker to escalate privileges when certificate based authentication is enabled
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 5.5 - 27.3
CVSS 3.1 base score: 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)
Mitigation: Disable certificate based authentication.
Resolution: Upgrade to Pexip Infinity 27.4
CVE-2022-27937: Insufficient input validation in the H.264 codec implementation allows an unauthenticated remote attacker to trigger excess resource consumption leading to a software abort and denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: All before 27.3
CVSS 3.1 base score: 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)
Mitigation: Where practical, disable all H.264 codec variants in the
section of .Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-27935: Insufficient input validation in the Epic Telehealth implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 25-27.2
CVSS 3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: None
Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-27934: Insufficient input validation in the Hypertext Transfer Protocol implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 25-27.2
CVSS 3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: None
Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-27933: Insufficient input validation in the One Touch Join service allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service. In certain circumstances, the attacker is also able to enumerate OTJ endpoint usernames
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 24-27.2
CVSS 3.1 base score: 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H)
Mitigation: This vulnerability requires the configuration of a "Poly OTD" OTJ Endpoint, an associated OTJ Endpoint Group, the assignment of the OTJ Endpoint Group to a System Location, and associated OTJ Profile. The attacker needs to be able to submit requests to a Conferencing Node in the relevant System Location. Ensure that System Locations associated with OTJ Profiles containing Poly Endpoints are restricted to trusted network segments only.
Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-27932: Insufficient input validation in the One Touch Join service allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 24-27.2
CVSS 3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: This vulnerability requires the configuration of a "Poly OTD" OTJ Endpoint, an associated OTJ Endpoint Group, the assignment of the OTJ Endpoint Group to a System Location, and associated OTJ Profile. The attacker needs to be able to submit requests to a Conferencing Node in the relevant System Location. Ensure that System Locations associated with OTJ Profiles containing Poly Endpoints are restricted to trusted network segments only.
Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-27931: Insufficient input validation in the Session Initiation Protocol implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 24-27.2
CVSS 3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: Where practical, disable the SIP implementation in the
section of .Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-27930: Insufficient input validation in the single-sign-on implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 27-27.2
CVSS 3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: The unique identifier for an Identity Provider is required to be able to exploit this vulnerability. Identifiers are a randomly generated Universally Unique Identifier and thus unlikely to be guessed correctly.
Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-27929: Insufficient input validation in the Hypertext Transfer Protocol implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 27-27.2
CVSS 3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: None
Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-27928: Insufficient input validation in the Session Initiation Protocol implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 27-27.2
CVSS 3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: Where practical, disable the SIP implementation in the
section of .Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-26657: Insufficient input validation in the One Touch Join service allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 24-27.2
CVSS 3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: This vulnerability requires the configuration of a "Poly OTD" OTJ Endpoint, an associated OTJ Endpoint Group, the assignment of the OTJ Endpoint Group to a System Location, and associated OTJ Profile. The attacker needs to be able to submit requests to a Conferencing Node in the relevant System Location. Ensure that System Locations associated with OTJ Profiles containing Poly Endpoints are restricted to trusted network segments only.
Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-26656: Insufficient input validation in the One Touch Join service allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service. In certain circumstances, the attacker is also able to enumerate OTJ endpoint usernames
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 24-27.2
CVSS 3.1 base score: 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H)
Mitigation: This vulnerability requires the configuration of a "Poly OTD" OTJ Endpoint, an associated OTJ Endpoint Group, the assignment of the OTJ Endpoint Group to a System Location, and associated OTJ Profile. The attacker needs to be able to submit requests to a Conferencing Node in the relevant System Location. Ensure that System Locations associated with OTJ Profiles containing Poly Endpoints are restricted to trusted network segments only.
Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-26655: Missing logic in the Infinity Client API implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 27-27.2
CVSS 3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: This vulnerability only affects gateway calls from API clients (e.g. WebRTC) into Microsoft Teams. Disabling the Client API in the
section of is one way to mitigate this issue. Alternatively, ensure access to call routing rules targetting Microsoft Teams are restricted to trusted devices or locations.Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-26654: Missing logic in the Hypertext Transfer Protocol implementation allows an unauthenticated remote attacker to trigger a software abort leading to a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 24-27.2
CVSS 3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: None
Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-22720: Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling
Impact to Pexip Infinity: Critical
Affected versions of Pexip Infinity: All before 27.3
CVSS 3.1 base score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Mitigation: None
Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-0778: OpenSSL 1.0.2zc and earlier can be forced into an infinite loop by crafting a certificate containing invalid elliptic curve parameters, allowing an attacker to trigger a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: All before 27.3
CVSS 3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: None
Resolution: Upgrade to Pexip Infinity 27.3
CVE-2022-25357: Insufficient authorization checks in the call join implementation under certain circumstances allows a window where an unauthenticated remote attacker could join a locked but not PIN-protected conference
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 27.0, 27.1
CVSS3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
Mitigation: Ensure all conferences are PIN protected.
Resolution: Upgrade to Pexip Infinity 27.2
CVE-2021-20322: A weakness when handling ICMP errors in the Linux kernel could allow a remote attacker to defeat UDP source port randomization
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: All before 27
CVSS 3.1 base score: 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
Mitigation: None
Resolution: Upgrade to Pexip Infinity 27.0
CVE-2021-33909: The Linux kernel filesystem implementation contained a flaw which could allow an unprivileged local user to cause a denial of service or escalate privileges
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 13 - 26.2
CVSS 3.1 base score: 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Mitigation: Exploitation of this vulnerability requires an unprivileged attacker to be able to run arbitrary code on the system, which is not the case in normal operation.
Resolution: Upgrade to Pexip Infinity 27.0
CVE-2021-41073: The io_uring implementation in the Linux kernel contained a flaw which could allow an unprivileged local user to escalate privileges
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 26.x
CVSS 3.1 base score: 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Mitigation: Exploitation of this vulnerability requires an unprivileged attacker to be able to run arbitrary code on the system, which is not the case in normal operation.
Resolution: Upgrade to Pexip Infinity 27.0
CVE-2021-3712: Parts of the OpenSSL toolkit assumed that ASN.1 string data was stored with a NUL terminator. An attacker able to cause an application to call a vulnerable function with non-terminated data could cause a denial of service, or possible information disclosure
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: All before 27
CVSS 3.1 base score: 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H)
Mitigation: None
Resolution: Upgrade to Pexip Infinity 27.0
CVE-2022-23228: Insufficient input validation in the WebRTC implementation allows an unauthenticated remote attacker to cause excessive resource usage leading to a temporary loss of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 1.0 to 26.2
CVSS3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: Disable WebRTC via
.Resolution: Upgrade to Pexip Infinity 27.0
CVE-2021-42555: Insufficient input validation in the in call setup implementation allows an unauthenticated remote attacker to cause a software abort leading to a temporary loss of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 25.0 to 26.1
CVSS3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: Disable gateway rules that allow untrusted devices to place outbound calls to Skype for Business.
Resolution: Upgrade to Pexip Infinity 26.2
CVE-2021-41773: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased paths, this could allow for remote code execution
Impact to Pexip Infinity: Medium
Affected versions of Pexip Infinity: 26.1
CVSS3.1 base score: 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Mitigation: Pexip Infinity configures the Apache HTTP server with a strict ACL which denies access unless explicitly granted. Support for CGI scripts is not enabled. The scope of this vulnerability is limited to the disclosure, on the Pexip Infinity Management Node, of the contents of the administrative web interface bootstrap script. This script contains no credentials or other sensitive information. Pexip Infinity Conferencing Nodes will not expose any information as a result of this vulnerability.
As general good practice, ensure that access to the Pexip Infinity Management Node is restricted to trusted networks using appropriate firewalls.
Resolution: Upgrade to Pexip Infinity 26.2
CVE-2021-42013: It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If CGI scripts are also enabled for these aliased paths, this could allow for remote code execution
Impact to Pexip Infinity: Medium
Affected versions of Pexip Infinity: 26.1
CVSS3.1 base score: 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Mitigation: Pexip Infinity configures the Apache HTTP server with a strict ACL which denies access unless explicitly granted. Support for CGI scripts is not enabled. The scope of this vulnerability is limited to the disclosure, on the Pexip Infinity Management Node, of the contents of the administrative web interface bootstrap script. This script contains no credentials or other sensitive information. Pexip Infinity Conferencing Nodes will not expose any information as a result of this vulnerability.
As general good practice, ensure that access to the Pexip Infinity Management Node is restricted to trusted networks using appropriate firewalls.
Resolution: Upgrade to Pexip Infinity 26.2
CVE-2021-34798: Malformed requests may cause the Apache web server to dereference a NULL pointer resulting in a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: All before 26.1
CVSS3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: None.
Resolution: Upgrade to Pexip Infinity 26.1
CVE-2021-39275: The ap_escape_quotes() function in the Apache httpd may write beyond the end of a buffer when given malicious input
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: All before 26.1
CVSS3.1 base score: 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
Mitigation: None.
Resolution: Upgrade to Pexip Infinity 26.1
CVE-2021-40438: A crafted HTTP request can cause the proxy module of Apache httpd to forward the request to an origin server chosen by the attacker
Impact to Pexip Infinity: Critical
Affected versions of Pexip Infinity: All before 26.1
CVSS3.1 base score: 9.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Mitigation: None.
Resolution: Upgrade to Pexip Infinity 26.1
CVE-2021-32545: Incomplete input validation in the RTMP implementation allows an unauthenticated remote attacker to cause a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 7-25.4
CVSS3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: This issue may be mitigated by disabling support for RTMP via
. However, RTMP is required for streaming conferences to external recording implementations. If this functionality is required, ensure that call routing rules are configured to allow RTMP connections to trusted destinations only.Resolution: Upgrade to Pexip Infinity 26.0
CVE-2021-33498: Incomplete input validation in the H.264 implementation allows an unauthenticated remote attacker to cause a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 1-25.4
CVSS3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: None.
Resolution: Upgrade to Pexip Infinity 26.0
CVE-2021-33499: Incomplete input validation in the H.264 implementation allows an unauthenticated remote attacker to cause a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 1-25.4
CVSS3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: None.
Resolution: Upgrade to Pexip Infinity 26.0
CVE-2021-35969: Insufficient input validation in the in call setup implementation allows an unauthenticated remote attacker to cause a software abort leading to a temporary loss of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 22.0 to 25.4
CVSS3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: This issue may be mitigated by disabling the Opus codec via
. To disable the codec, remove Opus from the chosen codecs list.Resolution: Upgrade to Pexip Infinity 26.0
CVE-2021-31925: Incomplete input validation in the administrative web interface allows an unauthenticated remote attacker to cause a denial of service
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 25.0-25.3
CVSS3.1 base score: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Mitigation: None.
Resolution: Upgrade to Pexip Infinity 25.4
CVE-2021-3156: Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character
Impact to Pexip Infinity: Low
Affected versions of Pexip Infinity: All before 25.1
CVSS3.1 base score: 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Mitigation: Pexip Infinity has a single administrative user account which already has privileged access to the system. Therefore there is no direct risk to Infinity from legitimate administrative users.
Resolution: Upgrade to Pexip Infinity 25.1
CVE-2020-25705: A flaw in the way reply ICMP packets are limited in the Linux kernel functionality was found that allows to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well
Impact to Pexip Infinity: High
Affected versions of Pexip Infinity: 13-24.3
CVSS 3.1 base score: 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
Mitigation: None
Resolution: Upgrade to Pexip Infinity 25.0
Infinity Connect
Each bulletin addresses a number of vulnerabilities in the software used by Infinity Connect. The bulletins include an assessment of the issues, the impact to Infinity Connect, and resolution details.
Bulletin | Description | Risk | Updated | Addressed in version |
---|---|---|---|---|
CVE-2021-29655 | Missing authenticity checks in application provisioning allow an attacker to cause the application to run untrusted code. | High | June 2021 | 1.8.0 |
CVE-2021-29656 | Missing checks in certificate allow list matching allow a remote attacker to compromise a TLS connection, extracting data and potentially causing remote code execution. | High | June 2021 | 1.8.0 |
CVE-2021-29655: Missing authenticity checks in application provisioning allow an attacker to cause the application to run untrusted code.
Impact to Infinity Connect: High
Affected versions of Infinity Connect: All before 1.8.0
CVSS3.1 base score: 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
Mitigation: None
Resolution: Upgrade to Infinity Connect 1.8.0
Credit: This issue was responsibly disclosed by The UK's National Cyber Security Centre (NCSC)
CVE-2021-29656: Missing checks in certificate allow list matching allow a remote attacker to compromise a TLS connection, extracting data and potentially causing remote code execution.
Impact to Infinity Connect: High
Affected versions of Infinity Connect: All before 1.8.0
CVSS3.1 base score: 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
Mitigation: None
Resolution: Upgrade to Pexip Infinity Connect 1.8.0
Credit: This issue was responsibly disclosed by The UK's National Cyber Security Centre (NCSC)