CVE-2026-34235
Published: 31 March 2026
Summary
CVE-2026-34235 is a critical-severity Out-of-bounds Read (CWE-125) vulnerability in Teluu Pjsip. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 19.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the vulnerability by requiring timely remediation through patching PJSIP to version 2.17 or later.
Enables disabling unnecessary VP9 codec functionality as a workaround to prevent exploitation of the VP9 RTP unpacketizer.
Provides memory protections that mitigate unauthorized heap access and disclosure from out-of-bounds reads.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remote unauthenticated out-of-bounds read in the PJSIP RTP/VP9 parser, directly enabling exploitation of public-facing applications via crafted network packets with no user interaction required.
NVD Description
PJSIP is a free and open source multimedia communication library written in C. Prior to version 2.17, a heap out-of-bounds read vulnerability exists in PJSIP's VP9 RTP unpacketizer that occurs when parsing crafted VP9 Scalability Structure (SS) data. Insufficient bounds…
more
checking on the payload descriptor length may cause reads beyond the allocated RTP payload buffer. This issue has been patched in version 2.17. A workaround for this issue involves disabling VP9 codec if not needed.
Deeper analysisAI
CVE-2026-34235 is a heap out-of-bounds read vulnerability in PJSIP, a free and open-source multimedia communication library written in C. The flaw affects versions prior to 2.17 and resides in the VP9 RTP unpacketizer, where insufficient bounds checking on the payload descriptor length during parsing of crafted VP9 Scalability Structure (SS) data can lead to reads beyond the allocated RTP payload buffer. This issue is classified under CWE-125 (Out-of-bounds Read) and carries a CVSS v3.1 base score of 9.1.
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation can result in high-impact confidentiality and availability violations, potentially allowing disclosure of sensitive information from heap memory or denial-of-service via application crashes, while integrity remains unaffected due to the read-only nature of the flaw.
The patch is available in PJSIP version 2.17, as detailed in the project's GitHub commit (f4c7d08211da1fe2ad1504434a0ad99d12aa7536) and security advisory (GHSA-pqrm-53pc-wx28). A recommended workaround is to disable the VP9 codec if it is not required.
Details
- CWE(s)