Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-34235

CVE-2026-34235: PJSIP Buffer Overflow Vulnerability

CVE-2026-34235 is a heap buffer overflow in PJSIP's VP9 RTP unpacketizer affecting versions before 2.17. Attackers can exploit crafted VP9 packets to trigger out-of-bounds reads. This article covers technical details, affected versions, impact, and mitigation steps.

Published: April 2, 2026

CVE-2026-34235 Overview

CVE-2026-34235 is an Out-of-Bounds Read vulnerability affecting PJSIP, a free and open source multimedia communication library written in C. Prior to version 2.17, a heap out-of-bounds read vulnerability exists in PJSIP's VP9 RTP unpacketizer that occurs when parsing crafted VP9 Scalability Structure (SS) data. Insufficient bounds checking on the payload descriptor length may cause reads beyond the allocated RTP payload buffer.

Critical Impact

Attackers can exploit this vulnerability remotely by sending crafted VP9 RTP packets, potentially causing information disclosure or denial of service through memory access violations.

Affected Products

  • PJSIP versions prior to 2.17
  • Applications using PJSIP's VP9 codec functionality
  • VoIP and multimedia communication systems built on PJSIP

Discovery Timeline

  • 2026-03-31 - CVE CVE-2026-34235 published to NVD
  • 2026-04-02 - Last updated in NVD database

Technical Details for CVE-2026-34235

Vulnerability Analysis

This vulnerability is classified as CWE-125 (Out-of-bounds Read), occurring in PJSIP's VP9 RTP packetization handling code. The flaw resides in the vpx_packetizer.c file where the VP9 Scalability Structure (SS) data is parsed from incoming RTP packets.

When processing VP9 RTP payloads, the unpacketizer examines flags in the payload descriptor to determine the presence of optional fields. Specifically, when the Y bit (0x10) is set, indicating that each spatial layer's frame resolution is present, the code increments the descriptor length by N_S * 4 bytes. However, prior to the patch, no validation was performed to ensure this calculated descriptor length remained within the bounds of the actual payload buffer.

An attacker can craft a malicious VP9 RTP packet with specific flag combinations that cause the descriptor length calculation to exceed the payload length, resulting in heap memory being read beyond the allocated buffer boundaries.

Root Cause

The root cause is insufficient bounds checking in the VP9 payload descriptor parsing logic. When the Y flag is set in the Scalability Structure, the code adds to the descriptor length without verifying that the resulting value does not exceed payload_len. This allows subsequent code to read memory outside the allocated RTP payload buffer, potentially exposing sensitive heap data or causing application crashes.

Attack Vector

The vulnerability is network-accessible, requiring no authentication or user interaction to exploit. An attacker can send specially crafted VP9 RTP packets to a vulnerable PJSIP-based application. The attack leverages the Scalability Structure parsing by setting specific flags (Y bit) with controlled N_S values to trigger the out-of-bounds read condition.

c
 
            INC_DESC_LEN();
            /* Y: Each spatial layer's frame resolution present. */
-            if (*q & 0x10) desc_len += N_S * 4;
+            if (*q & 0x10) {
+                desc_len += N_S * 4;
+                if (desc_len >= payload_len)
+                    return PJ_ETOOSMALL;
+            }

            /* G: PG description present flag. */
            if (*q & 0x8) {

Source: GitHub Commit Update

Detection Methods for CVE-2026-34235

Indicators of Compromise

  • Unusual VP9 RTP packets with malformed Scalability Structure data
  • Application crashes or unexpected termination in PJSIP-based services
  • Memory access violations logged in system crash dumps or error logs
  • Anomalous RTP traffic patterns targeting VP9 codec endpoints

Detection Strategies

  • Monitor for VP9 RTP packets with suspicious payload descriptor flags, particularly those with the Y bit (0x10) set
  • Implement network intrusion detection rules for malformed VP9 RTP payloads with abnormal descriptor lengths
  • Deploy application-level logging to capture VP9 unpacketizer errors and PJ_ETOOSMALL return codes
  • Use memory sanitizers (ASan, MSan) in development and testing environments to detect out-of-bounds reads

Monitoring Recommendations

  • Enable verbose logging for PJSIP media codec operations to track VP9 processing anomalies
  • Implement RTP packet inspection at network boundaries to identify crafted payloads
  • Monitor application memory usage patterns for signs of heap corruption or unexpected memory access
  • Set up alerting for repeated VP9 decoding failures that may indicate exploitation attempts

How to Mitigate CVE-2026-34235

Immediate Actions Required

  • Upgrade PJSIP to version 2.17 or later which contains the security patch
  • If upgrading is not immediately possible, disable the VP9 codec in your PJSIP configuration
  • Audit systems using PJSIP to identify all affected deployments
  • Review network logs for any potential exploitation attempts prior to patching

Patch Information

The vulnerability has been patched in PJSIP version 2.17. The fix adds proper bounds checking after calculating the descriptor length when the Y flag is present, returning PJ_ETOOSMALL if the descriptor length would exceed the payload length. The patch is available in commit f4c7d08211da1fe2ad1504434a0ad99d12aa7536. For detailed patch information, see the GitHub Security Advisory.

Workarounds

  • Disable the VP9 codec in PJSIP configuration if it is not required for your use case
  • Implement network-level filtering to block malformed VP9 RTP packets at the perimeter
  • Use application firewalls or deep packet inspection to validate RTP payload structures
  • Consider restricting RTP communication to trusted endpoints only
bash
# Configuration example - Disable VP9 codec in PJSIP
# In your pjsip configuration, disable VP9 by removing it from the codec list
# or explicitly disabling it in codec configuration:

# pjsua command line example:
pjsua --dis-codec=VP9

# Or in pjsua2 Python:
# codec_param = ep.codecGetParam("VP9")
# codec_param.priority = 0
# ep.codecSetParam("VP9", codec_param)

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechPjsip

  • SeverityMEDIUM

  • CVSS Score6.9

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-125
  • Technical References
  • GitHub Commit Update

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-40614: PJSIP Opus Buffer Overflow Vulnerability

  • CVE-2026-40892: PJSIP Buffer Overflow Vulnerability

  • CVE-2026-32945: PJSIP Buffer Overflow Vulnerability

  • CVE-2026-29068: Pjsip Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English