RTP Packet Handling Issue in Pion Interceptor Framework by Pion
CVE-2025-49140
What is CVE-2025-49140?
The Pion Interceptor is a framework designed for RTP/RTCP communication software but contains a vulnerability in its RTP packet factory. Users of versions v0.1.36 to v0.1.38 may experience a panic if crafted RTP packets are sent, leading to potential disruptions in Pion-based SFU environments. To remedy this issue, it is recommended to upgrade to version v0.1.39 or later, which includes enhanced validation of the packet length and error handling to prevent crashes. For those unable to upgrade immediately, manual patching or filtering of packets with set P-bits (with padLen of zero or exceeding the remaining payload) is advised.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
interceptor >= 0.1.36, < 0.1.39
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
