Vulnerability Details : CVE-2021-41105
Potential exploit
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. When handling SRTP calls, FreeSWITCH prior to version 1.10.7 is susceptible to a DoS where calls can be terminated by remote attackers. This attack can be done continuously, thus denying encrypted calls during the attack. When a media port that is handling SRTP traffic is flooded with a specially crafted SRTP packet, the call is terminated leading to denial of service. This issue was reproduced when using the SDES key exchange mechanism in a SIP environment as well as when using the DTLS key exchange mechanism in a WebRTC environment. The call disconnection occurs due to line 6331 in the source file `switch_rtp.c`, which disconnects the call when the total number of SRTP errors reach a hard-coded threshold (100). By abusing this vulnerability, an attacker is able to disconnect any ongoing calls that are using SRTP. The attack does not require authentication or any special foothold in the caller's or the callee's network. This issue is patched in version 1.10.7.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2021-41105
- cpe:2.3:a:freeswitch:freeswitch:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-41105
4.42%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-41105
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2021-41105
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: security-advisories@github.com (Secondary)
References for CVE-2021-41105
-
https://github.com/signalwire/freeswitch/releases/tag/v1.10.7
Release FreeSWITCH v1.10.7 Release · signalwire/freeswitch · GitHubRelease Notes;Third Party Advisory
-
https://github.com/signalwire/freeswitch/security/advisories/GHSA-jh42-prph-gp36
FreeSWITCH susceptible to Denial of Service via invalid SRTP packets · Advisory · signalwire/freeswitch · GitHubExploit;Third Party Advisory
-
http://seclists.org/fulldisclosure/2021/Oct/43
Full Disclosure: [ES2021-09] FreeSWITCH susceptible to Denial of Service via invalid SRTP packetsExploit;Mailing List;Third Party Advisory
Jump to