{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-12207","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-25T11:52:20.560Z","datePublished":"2025-10-27T02:32:17.604Z","dateUpdated":"2026-02-24T07:04:19.651Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T07:04:19.651Z"},"title":"Kamailio Grammar Rule cfg.y yyerror_at null pointer dereference","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-476","lang":"en","description":"NULL Pointer Dereference"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"Denial of Service"}]}],"affected":[{"vendor":"n/a","product":"Kamailio","versions":[{"version":"5.5","status":"affected"}],"cpes":["cpe:2.3:a:kamailio:kamailio:*:*:*:*:*:*:*:*"],"modules":["Grammar Rule Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The actual existence of this vulnerability is currently in question. This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.7,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-25T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-11-04T00:06:00.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"zh_vul (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB","type":"coordinator"}],"references":[{"url":"https://vuldb.com/?id.329877","name":"VDB-329877 | Kamailio Grammar Rule cfg.y yyerror_at null pointer dereference","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.329877","name":"VDB-329877 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.673241","name":"Submit #673241 | Kamailio Project Kamailio SIP Server 5.5 NULL Pointer Dereference","tags":["third-party-advisory"]},{"url":"https://shimo.im/docs/vVqRMVMlrycMO63y/","tags":["exploit"]},{"url":"https://www.openwall.com/lists/oss-security/2025/11/02/3","tags":["related"]}],"tags":["disputed"]},"adp":[{"title":"CVE Program Container","references":[{"url":"https://www.openwall.com/lists/oss-security/2025/10/27/8"},{"url":"http://www.openwall.com/lists/oss-security/2025/10/27/12"},{"url":"http://www.openwall.com/lists/oss-security/2025/10/27/8"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T21:09:31.867Z"}},{"references":[{"url":"https://shimo.im/docs/vVqRMVMlrycMO63y","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-28T13:59:16.896381Z","id":"CVE-2025-12207","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-28T13:59:20.218Z"}}]}}