{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-12206","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-25T11:52:17.451Z","datePublished":"2025-10-27T02:32:12.753Z","dateUpdated":"2026-02-24T07:04:06.945Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T07:04:06.945Z"},"title":"Kamailio rvalue.c rve_is_constant null pointer dereference","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-476","lang":"en","description":"NULL Pointer Dereference"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"Denial of Service"}]}],"affected":[{"vendor":"n/a","product":"Kamailio","versions":[{"version":"5.5","status":"affected"}],"cpes":["cpe:2.3:a:kamailio:kamailio:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in Kamailio 5.5. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and may be used. It is still unclear if this vulnerability genuinely exists. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.7,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-25T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-11-04T00:05:58.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"zh_vul (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB","type":"coordinator"}],"references":[{"url":"https://vuldb.com/?id.329876","name":"VDB-329876 | Kamailio rvalue.c rve_is_constant null pointer dereference","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.329876","name":"VDB-329876 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.673240","name":"Submit #673240 | Kamailio Project Kamailio SIP Server 5.5 NULL Pointer Dereference","tags":["third-party-advisory"]},{"url":"https://shimo.im/docs/aBAYMVMB2jUP9jAj/","tags":["exploit"]},{"url":"https://www.openwall.com/lists/oss-security/2025/11/02/3","tags":["related"]}],"tags":["disputed"]},"adp":[{"title":"CVE Program Container","references":[{"url":"https://www.openwall.com/lists/oss-security/2025/10/27/8"},{"url":"http://www.openwall.com/lists/oss-security/2025/10/27/12"},{"url":"http://www.openwall.com/lists/oss-security/2025/10/27/8"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T21:09:29.239Z"}},{"references":[{"url":"https://shimo.im/docs/aBAYMVMB2jUP9jAj","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-28T14:00:58.701936Z","id":"CVE-2025-12206","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-28T14:01:02.423Z"}}]}}