CVE-2026-32942
Published: 20 March 2026
Summary
CVE-2026-32942 is a high-severity Use After Free (CWE-416) vulnerability in Pjsip Pjsip. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely patching of the specific heap use-after-free vulnerability in PJSIP versions 2.16 and below, as fixed in version 2.17.
Provides memory protections such as non-executable memory and ASLR to block exploitation of heap use-after-free leading to code execution, data disclosure, or modification.
Enables identification of systems using vulnerable PJSIP library versions through vulnerability scanning, supporting remediation efforts.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated network exploitation of PJSIP (public-facing SIP/ICE service) directly maps to initial access via public-facing application; high-impact memory corruption enables RCE/DoS in the service context.
NVD Description
PJSIP is a free and open source multimedia communication library written in C. Versions 2.16 and below contain a heap use-after-free vulnerability in the ICE session that occurs when there are race conditions between session destruction and the callbacks. This…
more
issue has been fixed in version 2.17.
Deeper analysisAI
CVE-2026-32942 is a heap use-after-free vulnerability (CWE-416) in the ICE session of PJSIP, a free and open-source multimedia communication library written in C. The issue affects versions 2.16 and below, arising from race conditions between session destruction and callbacks. Published on 2026-03-20, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Unauthenticated remote attackers can exploit this vulnerability over the network without user interaction, though it requires high attack complexity. Successful exploitation enables high-impact consequences, including unauthorized disclosure of sensitive information, modification of data, and denial of service.
The vulnerability is addressed in PJSIP version 2.17. Mitigation details are available in the fix commit at https://github.com/pjsip/pjproject/commit/c9caceddabda7f18337b2a82d25d65f6224b450a, the issue discussion at https://github.com/pjsip/pjproject/issues/1451, and the GitHub security advisory at https://github.com/pjsip/pjproject/security/advisories/GHSA-g88q-c2hm-q7p7.
Details
- CWE(s)