Cyber Posture

CVE-2026-25994

Critical

Published: 11 February 2026

Published
11 February 2026
Modified
19 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0061 70.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25994 is a critical-severity Classic Buffer Overflow (CWE-120) vulnerability in Pjsip Pjsip. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 30.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely identification, reporting, and patching of flaws like the buffer overflow in PJSIP's PJNATH ICE Session, directly remediating CVE-2026-25994.

prevent

SI-10 mandates validation of information inputs such as credentials with long usernames at processing points, preventing the buffer overflow trigger in PJNATH ICE Session.

prevent

SI-16 implements memory safeguards like ASLR and DEP to protect against unauthorized code execution from the buffer overflow exploitation in PJSIP.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote unauthenticated buffer overflow in PJSIP/PJNATH (network-facing ICE session handling) directly enables initial access via exploitation of a public-facing application for RCE/DoS.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

PJSIP is a free and open source multimedia communication library written in C. In 2.16 and earlier, a buffer overflow vulnerability exists in PJNATH ICE Session when processing credentials with excessively long usernames.

Deeper analysisAI

CVE-2026-25994 is a buffer overflow vulnerability (CWE-120) in the PJNATH ICE Session component of PJSIP, a free and open-source multimedia communication library written in C. The issue affects PJSIP versions 2.16 and earlier, where processing credentials containing excessively long usernames triggers the overflow. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact exploitation.

A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. By sending malformed credentials with overly long usernames to a vulnerable PJSIP instance handling ICE sessions, the attacker triggers the buffer overflow, potentially achieving arbitrary code execution, data corruption, or denial of service through system crashes.

The PJSIP project has addressed the vulnerability via a security advisory at GHSA-j29p-pvqp and a patch in commit 063b3a155f163cc5a9a1df2c56b6720fd3a0dbb0 on GitHub. Security practitioners should update to a fixed version of PJSIP beyond 2.16 and review deployments using PJNATH for ICE functionality.

Details

CWE(s)

Affected Products

pjsip
pjsip
≤ 2.16

CVEs Like This One

CVE-2026-32945Same product: Pjsip Pjsip
CVE-2026-40892Same product: Pjsip Pjsip
CVE-2026-32942Same product: Pjsip Pjsip
CVE-2026-33069Same product: Pjsip Pjsip
CVE-2026-29068Same product: Pjsip Pjsip
CVE-2026-28799Same product: Pjsip Pjsip
CVE-2026-40614Same product: Pjsip Pjsip
CVE-2025-29329Shared CWE-120
CVE-2025-55603Shared CWE-120
CVE-2024-39774Shared CWE-120

References