A serious security vulnerability has been discovered in the PJSIP library, specifically version 2.17 and earlier. This vulnerability, identified as CVE-2026-28799, constitutes a heap use-after-free issue that may impact server security significantly.
PJSIP is an open-source multimedia communication library used across various applications including VoIP services. The vulnerability manifests during the presence unsubscription phase. When a SUBSCRIBE message is sent with an Expiry of zero, it can lead to critical failures.
For system administrators and hosting providers, this vulnerability poses a serious threat. Attackers can exploit it to manipulate or crash servers, leading to potential data breaches. An impact on web application functionality may lead to data loss or corruption.
As the reliance on PJSIP continues in various communications frameworks, the risk of exploitation is high.
Malware detection will be critical post-attack, further underscoring the need for robust server defenses.
Here are essential steps system administrators should take immediately:
Don’t wait for a breach to happen. Strengthen your server security today! Start by trying BitNinja’s free 7-day trial. Discover how it can proactively protect your infrastructure against security threats.




