CVE-2026-25994
Published: 11 February 2026
Summary
CVE-2026-25994 is a critical-severity Classic Buffer Overflow (CWE-120) vulnerability in Pjsip Pjsip. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 30.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely identification, reporting, and patching of flaws like the buffer overflow in PJSIP's PJNATH ICE Session, directly remediating CVE-2026-25994.
SI-10 mandates validation of information inputs such as credentials with long usernames at processing points, preventing the buffer overflow trigger in PJNATH ICE Session.
SI-16 implements memory safeguards like ASLR and DEP to protect against unauthorized code execution from the buffer overflow exploitation in PJSIP.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated buffer overflow in PJSIP/PJNATH (network-facing ICE session handling) directly enables initial access via exploitation of a public-facing application for RCE/DoS.
NVD Description
PJSIP is a free and open source multimedia communication library written in C. In 2.16 and earlier, a buffer overflow vulnerability exists in PJNATH ICE Session when processing credentials with excessively long usernames.
Deeper analysisAI
CVE-2026-25994 is a buffer overflow vulnerability (CWE-120) in the PJNATH ICE Session component of PJSIP, a free and open-source multimedia communication library written in C. The issue affects PJSIP versions 2.16 and earlier, where processing credentials containing excessively long usernames triggers the overflow. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact exploitation.
A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. By sending malformed credentials with overly long usernames to a vulnerable PJSIP instance handling ICE sessions, the attacker triggers the buffer overflow, potentially achieving arbitrary code execution, data corruption, or denial of service through system crashes.
The PJSIP project has addressed the vulnerability via a security advisory at GHSA-j29p-pvqp and a patch in commit 063b3a155f163cc5a9a1df2c56b6720fd3a0dbb0 on GitHub. Security practitioners should update to a fixed version of PJSIP beyond 2.16 and review deployments using PJNATH for ICE functionality.
Details
- CWE(s)