Skip to main content

Tags Rtpengine

rtpengine: RTP Inject and RTP Bleed vulnerabilities despite proper configuration

Published on Jul 31, 2025 in , , ,

Description

Media servers often support source address learning to dynamically adapt to network conditions and client behavior. This is especially useful in scenarios involving NAT where the source IP and port of incoming RTP packets may differ from what was initially signaled via SDP over SIP. However, this mechanism can be exploited for two types of attacks if malicious packets are accepted as legitimate:

Read more about rtpengine: RTP Inject and RTP Bleed vulnerabilities despite proper configuration

Rtpengine RTP Injection and Media Bleed Vulnerabilities (CVE-2025-53399)

We published a critical security advisory for rtpengine affecting versions mr13.3.1.4 and lower, allowing RTP injection and media redirection attacks. These vulnerabilities can be exploited without man-in-the-middle positioning and affect both plaintext RTP and encrypted SRTP sessions. Organizations should upgrade to mr13.4.1.1 and review configuration settings.…

Read more about Rtpengine RTP Injection and Media Bleed Vulnerabilities (CVE-2025-53399)

rtpengine: denial of service via DTLS Hello packets during call initiation

TL;DR

When handling DTLS-SRTP for media setup, RTPEngine is susceptible to Denial of Service due to a race condition in the hello handshake phase of the DTLS protocol. This attack can be done continuously, thus denying new DTLS encrypted calls during the attack.

Read more about rtpengine: denial of service via DTLS Hello packets during call initiation