Cyber Posture

CVE-2026-41415

Critical

Published: 24 April 2026

Published
24 April 2026
Modified
28 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
EPSS Score 0.0006 17.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-41415 is a critical-severity Out-of-bounds Read (CWE-125) vulnerability in Teluu Pjsip. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely identification, reporting, and correction of flaws like the out-of-bounds read in PJSIP's parsing of malformed Content-ID URIs in SIP multipart messages.

prevent

Requires validation of inputs such as SIP multipart message bodies to detect and reject malformed Content-ID URIs before they reach the vulnerable PJSIP parser.

prevent

Provides memory safeguards like address space randomization and non-executable memory to mitigate information disclosure and denial-of-service from out-of-bounds reads in PJSIP.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote unauthenticated exploitation of this out-of-bounds read in a public-facing SIP service via crafted messages directly enables T1190 Exploit Public-Facing Application for initial access or DoS.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

PJSIP is a free and open source multimedia communication library written in C. In 2.16 and earlier, there is an out-of-bounds read when parsing a malformed Content-ID URI in SIP multipart message body. Insufficient length validation can cause reads beyond…

more

the intended buffer bounds. This vulnerability is fixed in 2.17.

Deeper analysisAI

CVE-2026-41415 is an out-of-bounds read vulnerability in PJSIP, a free and open-source multimedia communication library written in C. Affecting versions 2.16 and earlier, the flaw occurs when parsing a malformed Content-ID URI in a SIP multipart message body, due to insufficient length validation that allows reads beyond the intended buffer bounds. This issue is classified under CWE-125 (Out-of-bounds Read) and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H).

The vulnerability can be exploited remotely over the network by any unauthenticated attacker with low complexity and no user interaction required. By sending a specially crafted SIP multipart message containing a malformed Content-ID URI, an attacker can trigger the out-of-bounds read, potentially leading to sensitive information disclosure from memory or a denial-of-service condition through application crash.

Mitigation is available via an upgrade to PJSIP version 2.17, where the issue is fixed, as detailed in the project's GitHub commit (4225a93c16661538005017883fbc8f1ea1d5f4b0) and security advisory (GHSA-935m-fmf5-j4pm). Security practitioners should prioritize patching affected PJSIP deployments in SIP-based systems.

Details

CWE(s)

Affected Products

teluu
pjsip
≤ 2.17

CVEs Like This One

CVE-2026-34235Same product: Teluu Pjsip
CVE-2026-41416Same product: Teluu Pjsip
CVE-2026-42799Shared CWE-125
CVE-2026-22984Shared CWE-125
CVE-2025-69806Shared CWE-125
CVE-2026-22855Shared CWE-125
CVE-2025-55100Shared CWE-125
CVE-2025-48072Shared CWE-125
CVE-2025-54950Shared CWE-125
CVE-2025-1674Shared CWE-125

References