NULL Pointer Dereference Affecting livekit-sip package, versions *


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.71% (73rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-LIVEKITSIP-15308942
  • published19 Feb 2026
  • disclosed16 Dec 2025

Introduced: 16 Dec 2025

CVE-2025-68274  (opens in a new tab)
CWE-476  (opens in a new tab)
CWE-755  (opens in a new tab)

How to fix?

There is no fixed version for Minimos:latest livekit-sip.

NVD Description

Note: Versions mentioned in the description apply only to the upstream livekit-sip package and not the livekit-sip package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's NewResponseFromRequest function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the NewResponseFromRequest function. Version 1.0.0-alpha-1 contains a patch for the issue.

CVSS Base Scores

version 3.1