Impact
SIPp contains a NULL pointer dereference that occurs when it processes specially crafted SIP messages on an active call. The vulnerability can cause the program to crash, resulting in a denial of service. Under certain, unspecified conditions the flaw may also allow an attacker to execute unauthorized code, compromising both system integrity and availability.
Affected Systems
The affected product is SIPp. No specific vendor or version information is provided in the CVE, so all deployments of SIPp are potentially impacted until a patch is applied.
Risk and Exploitability
The CVSS score of 8.4 classifies this issue as high severity. The EPSS score is less than 1%, indicating that exploitation is currently unlikely but not impossible. The vulnerability is not listed in CISA’s KEV catalog, suggesting no widely available exploit. The attack vector is inferred to be remote and requires an attacker to send malicious SIP traffic to an exposed SIPp instance during an ongoing call.
OpenCVE Enrichment