{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T13:54:35.433","vulnerabilities":[{"cve":{"id":"CVE-2025-49140","sourceIdentifier":"security-advisories@github.com","published":"2025-06-09T22:15:22.153","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Pion Interceptor is a framework for building RTP/RTCP communication software. Versions v0.1.36 through v0.1.38 contain a bug in a RTP packet factory that can be exploited to trigger a panic with Pion based SFU via crafted RTP packets, This only affect users that use pion/interceptor. Users should upgrade to v0.1.39 or later, which validates that: `padLen > 0 && padLen <= payloadLength` and return error  on overflow, avoiding panic. If upgrading is not possible, apply the patch from the pull request manually or drop packets whose P-bit is set but whose padLen is zero or larger than the remaining payload."},{"lang":"es","value":"Pion Interceptor es un framework para crear software de comunicación RTP/RTCP. Las versiones v0.1.36 a v0.1.38 contienen un error en una fábrica de paquetes RTP que puede explotarse para generar un pánico con SFU basado en Pion mediante paquetes RTP manipulados. Esto solo afecta a los usuarios que usan pion/interceptor. Los usuarios deben actualizar a la versión v0.1.39 o posterior, que valida que `padLen &gt; 0 &amp;&amp; padLen &lt;= payloadLength` y devuelve un error en caso de desbordamiento, evitando así el pánico. Si no es posible actualizar, aplique el parche desde la solicitud de extracción manualmente o descarte los paquetes cuyo bit P esté configurado, pero cuyo padLen sea cero o mayor que la carga útil restante."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-770"}]}],"references":[{"url":"https://github.com/pion/interceptor/commit/fa5b35ea867389cec33a9c82fffbd459ca8958e5","source":"security-advisories@github.com"},{"url":"https://github.com/pion/interceptor/pull/338","source":"security-advisories@github.com"},{"url":"https://github.com/pion/interceptor/security/advisories/GHSA-f26w-gh5m-qq77","source":"security-advisories@github.com"},{"url":"https://github.com/pion/webrtc/issues/3148","source":"security-advisories@github.com"}]}}]}