Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teluu
Teluu pjsip |
|
| CPEs | cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Teluu
Teluu pjsip |
|
| Metrics |
cvssV3_1
|
Fri, 08 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pjsip
Pjsip pjproject |
|
| Vendors & Products |
Pjsip
Pjsip pjproject |
Thu, 07 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PJSIP is a free and open source multimedia communication library written in C. Prior to version 2.17, on GnuTLS builds, the SIP TLS transport (sip_transport_tls) can accept connections with invalid or untrusted certificates even when the application explicitly enables certificate verification via verify_server = PJ_TRUE or verify_client = PJ_TRUE. This issue has been patched in version 2.17. | |
| Title | GnuTLS backend silently skips certificate chain verification when verify_peer is false | |
| Weaknesses | CWE-295 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-08T14:18:36.257Z
Reserved: 2026-04-25T05:37:12.116Z
Link: CVE-2026-42225
Updated: 2026-05-08T14:18:33.201Z
Status : Analyzed
Published: 2026-05-07T20:16:43.960
Modified: 2026-05-12T15:53:39.970
Link: CVE-2026-42225
No data.
OpenCVE Enrichment
Updated: 2026-05-07T20:30:15Z