7.5
CVSSv3

CVE-2025-49140

CVSSv4: NA | CVSSv3: 7.5 | CVSSv2: NA | VMScore: 850 | EPSS: 0.00055 | KEV: Not Included
Published: 09/06/2025 Updated: 09/06/2025

Vulnerability Summary

Pion Interceptor RTP Packet Parsing Vulnerability Leading to Remote Panic

Pion Interceptor, a framework for RTP/RTCP communication software, has a vulnerability in versions v0.1.36 through v0.1.38 involving its RTP packet factory. An attacker can exploit this weakness by sending crafted RTP packets to trigger a panic in Pion-based SFU implementations. The issue exclusively impacts users of pion/interceptor. To mitigate the risk, users are recommended to upgrade to version v0.1.39 or later, which includes validation checks to prevent potential overflows by ensuring `padLen > 0 && padLen <= payloadLength`. If immediate upgrading is not feasible, users can manually apply the patch from the associated pull request or implement a workaround by dropping packets where the P-bit is set but the padLen is zero or exceeds the remaining payload length.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pion interceptor