CVE-2021-33499
NixOS vulnerability analysis and mitigation

Overview

Pexip Infinity before version 26 contains a vulnerability related to missing H.264 input validation (CVE-2021-33499). This vulnerability was disclosed and documented in early 2022 (NIST NVD, MITRE CVE).

Technical details

The vulnerability is specifically related to missing input validation for H.264 video content in Pexip Infinity systems. This is identified as issue 2 of 2 related H.264 input validation vulnerabilities, with a companion issue being tracked as CVE-2021-33498 (MITRE CVE).

Impact

When exploited, this vulnerability allows remote attackers to cause a denial of service condition in the affected Pexip Infinity systems (MITRE CVE).

Mitigation and workarounds

The vulnerability has been addressed in Pexip Infinity version 26 and later releases. Organizations running affected versions should upgrade to version 26 or newer to mitigate this security risk (MITRE CVE).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-20807MEDIUM6.7
  • NixOSNixOS
  • android
NoNoJan 06, 2026
CVE-2025-20806MEDIUM6.7
  • NixOSNixOS
  • android
NoNoJan 06, 2026
CVE-2025-20805MEDIUM6.7
  • NixOSNixOS
  • android
NoNoJan 06, 2026
CVE-2025-20804MEDIUM6.7
  • NixOSNixOS
  • android
NoNoJan 06, 2026
CVE-2025-20803MEDIUM6.7
  • NixOSNixOS
  • android
NoNoJan 06, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management