pexip CVE Vulnerabilities & Metrics

Focus on pexip vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About pexip Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with pexip. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total pexip CVEs: 35
Earliest CVE date: 03 Feb 2015, 16:59 UTC
Latest CVE date: 25 Dec 2023, 06:15 UTC

Latest CVE reference: CVE-2023-37225

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical pexip CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.15

Max CVSS: 9.3

Critical CVEs (≥9): 3

CVSS Range vs. Count

Range Count
0.0-3.9 4
4.0-6.9 23
7.0-8.9 5
9.0-10.0 3

CVSS Distribution Chart

Top 5 Highest CVSS pexip CVEs

These are the five CVEs with the highest CVSS scores for pexip, sorted by severity first and recency.

All CVEs for pexip

CVE-2023-37225 pexip vulnerability CVSS: 0 25 Dec 2023, 06:15 UTC

Pexip Infinity before 32 allows Webapp1 XSS via preconfigured links.

CVE-2023-31455 pexip vulnerability CVSS: 0 25 Dec 2023, 06:15 UTC

Pexip Infinity before 31.2 has Improper Input Validation for RTCP, allowing remote attackers to trigger an abort.

CVE-2023-31289 pexip vulnerability CVSS: 0 25 Dec 2023, 06:15 UTC

Pexip Infinity before 31.2 has Improper Input Validation for signalling, allowing remote attackers to trigger an abort.

CVE-2022-32263 pexip vulnerability CVSS: 0 17 Jul 2022, 22:15 UTC

Pexip Infinity before 28.1 allows remote attackers to trigger a software abort via G.719.

CVE-2022-29286 pexip vulnerability CVSS: 5.0 17 Jul 2022, 22:15 UTC

Pexip Infinity 27 before 28.0 allows remote attackers to trigger excessive resource consumption and termination because of registrar resource mishandling.

CVE-2022-27937 pexip vulnerability CVSS: 5.0 17 Jul 2022, 21:15 UTC

Pexip Infinity before 27.3 allows remote attackers to trigger excessive resource consumption via H.264.

CVE-2022-27936 pexip vulnerability CVSS: 5.0 17 Jul 2022, 21:15 UTC

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via H.323.

CVE-2022-27935 pexip vulnerability CVSS: 5.0 17 Jul 2022, 21:15 UTC

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via Epic Telehealth.

CVE-2022-27934 pexip vulnerability CVSS: 5.0 17 Jul 2022, 21:15 UTC

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via HTTP.

CVE-2022-27933 pexip vulnerability CVSS: 5.8 17 Jul 2022, 21:15 UTC

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.

CVE-2022-27932 pexip vulnerability CVSS: 4.3 17 Jul 2022, 21:15 UTC

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.

CVE-2022-27931 pexip vulnerability CVSS: 5.0 17 Jul 2022, 21:15 UTC

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.

CVE-2022-27930 pexip vulnerability CVSS: 4.3 17 Jul 2022, 21:15 UTC

Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via single-sign-on if a random Universally Unique Identifier is guessed.

CVE-2022-27929 pexip vulnerability CVSS: 5.0 17 Jul 2022, 21:15 UTC

Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via HTTP.

CVE-2022-27928 pexip vulnerability CVSS: 5.0 17 Jul 2022, 21:15 UTC

Pexip Infinity 27.x before 27.3 allows remote attackers to trigger a software abort via the Session Initiation Protocol.

CVE-2022-26657 pexip vulnerability CVSS: 5.0 17 Jul 2022, 21:15 UTC

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort via One Touch Join.

CVE-2022-26656 pexip vulnerability CVSS: 6.4 17 Jul 2022, 21:15 UTC

Pexip Infinity before 27.3 allows remote attackers to trigger a software abort, and possibly enumerate usernames, via One Touch Join.

CVE-2022-26655 pexip vulnerability CVSS: 5.0 17 Jul 2022, 21:15 UTC

Pexip Infinity 27.x before 27.3 has Improper Input Validation. The client API allows remote attackers to trigger a software abort via a gateway call into Teams.

CVE-2022-26654 pexip vulnerability CVSS: 5.0 17 Jul 2022, 21:15 UTC

Pexip Infinity before 27.3 allows remote attackers to force a software abort via HTTP.

CVE-2022-25357 pexip vulnerability CVSS: 5.0 17 Jul 2022, 21:15 UTC

Pexip Infinity 27.x before 27.2 has Improper Access Control. An attacker can sometimes join a conference (call join) if it has a lock but not a PIN.

CVE-2022-23228 pexip vulnerability CVSS: 5.0 18 Feb 2022, 22:15 UTC

Pexip Infinity before 27.0 has improper WebRTC input validation. An unauthenticated remote attacker can use excessive resources, temporarily causing denial of service.

CVE-2021-31925 pexip vulnerability CVSS: 5.0 07 Jul 2021, 15:15 UTC

Pexip Infinity 25.x before 25.4 has Improper Input Validation, and thus an unauthenticated remote attacker can cause a denial of service via the administrative web interface.

CVE-2020-25868 pexip vulnerability CVSS: 5.0 07 Jul 2021, 14:15 UTC

Pexip Infinity 22.x through 24.x before 24.2 has Improper Input Validation for call setup. An unauthenticated remote attacker can trigger a software abort (temporary loss of service).

CVE-2020-24615 pexip vulnerability CVSS: 5.0 25 Sep 2020, 04:23 UTC

Pexip Infinity before 24.1 has Improper Input Validation, leading to temporary denial of service via SIP.

CVE-2020-13387 pexip vulnerability CVSS: 5.0 25 Sep 2020, 04:23 UTC

Pexip Infinity before 23.4 has a lack of input validation, leading to temporary denial of service via H.323.

CVE-2020-12824 pexip vulnerability CVSS: 5.0 25 Sep 2020, 04:23 UTC

Pexip Infinity 23.x before 23.3 has improper input validation, leading to a temporary software abort via RTP.

CVE-2020-11805 pexip vulnerability CVSS: 9.3 25 Sep 2020, 04:23 UTC

Pexip Reverse Proxy and TURN Server before 6.1.0 has Incorrect UDP Access Control via TURN.

CVE-2019-7178 pexip vulnerability CVSS: 9.0 25 Sep 2020, 04:23 UTC

Pexip Infinity before 20.1 allows privilege escalation by restoring a system backup.

CVE-2019-7177 pexip vulnerability CVSS: 9.0 25 Sep 2020, 04:23 UTC

Pexip Infinity before 20.1 allows Code Injection onto nodes via an admin.

CVE-2018-10585 pexip vulnerability CVSS: 7.8 25 Sep 2020, 04:23 UTC

Pexip Infinity before 18 allows remote Denial of Service (XML parsing).

CVE-2018-10432 pexip vulnerability CVSS: 7.8 25 Sep 2020, 04:23 UTC

Pexip Infinity before 18 allows Remote Denial of Service (TLS handshakes in RTMP).

CVE-2017-17477 pexip vulnerability CVSS: 4.3 25 Sep 2020, 04:23 UTC

Pexip Infinity before 17 allows an unauthenticated remote attacker to achieve stored XSS via management web interface views.

CVE-2015-4719 pexip vulnerability CVSS: 7.5 24 Sep 2020, 02:15 UTC

The client API authentication mechanism in Pexip Infinity before 10 allows remote attackers to gain privileges via a crafted request.

CVE-2017-6551 pexip vulnerability CVSS: 7.5 02 May 2017, 14:59 UTC

Pexip Infinity before 14.2 allows remote attackers to cause a denial of service (service restart) or execute arbitrary code via vectors related to Conferencing Nodes.

CVE-2014-8779 pexip vulnerability CVSS: 7.1 03 Feb 2015, 16:59 UTC

Pexip Infinity before 8 uses the same SSH host keys across different customers' installations, which allows man-in-the-middle attackers to spoof Management and Conferencing Nodes by leveraging these keys.