CVE-2025-68274

HIGH

Emiago Sipgo < 1.0.0-alpha-1 - Improper Exception Handling

Title source: rule
STIX 2.1

Description

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.

Scores

CVSS v3 7.5
EPSS 0.0083
EPSS Percentile 74.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-476 CWE-755
Status published
Products (2)
emiago/sipgo 0.3.0 - 1.0.0-alpha-1Go
emiago/sipgo 0.30.0 - 1.0.0
Published Dec 16, 2025
Tracked Since Feb 18, 2026