CVE-2026-41415
Published: 24 April 2026
Summary
CVE-2026-41415 is a critical-severity Out-of-bounds Read (CWE-125) vulnerability in Teluu Pjsip. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely identification, reporting, and correction of flaws like the out-of-bounds read in PJSIP's parsing of malformed Content-ID URIs in SIP multipart messages.
Requires validation of inputs such as SIP multipart message bodies to detect and reject malformed Content-ID URIs before they reach the vulnerable PJSIP parser.
Provides memory safeguards like address space randomization and non-executable memory to mitigate information disclosure and denial-of-service from out-of-bounds reads in PJSIP.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated exploitation of this out-of-bounds read in a public-facing SIP service via crafted messages directly enables T1190 Exploit Public-Facing Application for initial access or DoS.
NVD Description
PJSIP is a free and open source multimedia communication library written in C. In 2.16 and earlier, there is an out-of-bounds read when parsing a malformed Content-ID URI in SIP multipart message body. Insufficient length validation can cause reads beyond…
more
the intended buffer bounds. This vulnerability is fixed in 2.17.
Deeper analysisAI
CVE-2026-41415 is an out-of-bounds read vulnerability in PJSIP, a free and open-source multimedia communication library written in C. Affecting versions 2.16 and earlier, the flaw occurs when parsing a malformed Content-ID URI in a SIP multipart message body, due to insufficient length validation that allows reads beyond the intended buffer bounds. This issue is classified under CWE-125 (Out-of-bounds Read) and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H).
The vulnerability can be exploited remotely over the network by any unauthenticated attacker with low complexity and no user interaction required. By sending a specially crafted SIP multipart message containing a malformed Content-ID URI, an attacker can trigger the out-of-bounds read, potentially leading to sensitive information disclosure from memory or a denial-of-service condition through application crash.
Mitigation is available via an upgrade to PJSIP version 2.17, where the issue is fixed, as detailed in the project's GitHub commit (4225a93c16661538005017883fbc8f1ea1d5f4b0) and security advisory (GHSA-935m-fmf5-j4pm). Security practitioners should prioritize patching affected PJSIP deployments in SIP-based systems.
Details
- CWE(s)