Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-43043: n/a in n/a

0
Medium
VulnerabilityCVE-2022-43043cvecve-2022-43043
Published: Wed Oct 19 2022 (10/19/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segmentation violation via the function BD_CheckSFTimeOffset at /bifs/field_decode.c.

AI-Powered Analysis

AILast updated: 07/05/2025, 02:54:44 UTC

Technical Analysis

CVE-2022-43043 is a medium severity vulnerability identified in the GPAC multimedia framework, specifically in the development version 2.1-DEV-rev368-gfd054169b-master. The vulnerability arises from a segmentation violation triggered via the function BD_CheckSFTimeOffset located in the source file /bifs/field_decode.c. This issue is classified under CWE-125, which corresponds to an out-of-bounds read vulnerability. The segmentation violation indicates that the function improperly accesses memory outside the bounds of allocated buffers, potentially causing the application to crash or behave unpredictably. The CVSS 3.1 base score is 5.5, with vector AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but does require user interaction (UI:R). The impact is limited to availability (A:H), with no confidentiality or integrity impact. The vulnerability does not appear to have known exploits in the wild, and no patches or vendor advisories are currently linked. GPAC is an open-source multimedia framework used for packaging, streaming, and playback of multimedia content, including MPEG-DASH and other standards. The affected function BD_CheckSFTimeOffset likely deals with parsing or validating timing offsets in media streams, and improper handling can lead to memory access violations. This vulnerability could be triggered by a crafted media file or stream that a user opens or processes locally, causing a denial of service through application crash. Since the attack vector is local and requires user interaction, remote exploitation is unlikely without additional attack vectors such as social engineering or local access compromise.

Potential Impact

For European organizations, the primary impact of CVE-2022-43043 is a potential denial of service (DoS) condition affecting applications or services that utilize the vulnerable GPAC version for media processing. This could disrupt multimedia playback, streaming services, or media packaging workflows, particularly in sectors relying on GPAC for content delivery or media analysis. While the vulnerability does not compromise confidentiality or integrity, availability disruptions could impact media service providers, broadcasters, and enterprises using GPAC-based tools for internal or customer-facing applications. The requirement for local access and user interaction limits the risk of widespread remote exploitation; however, targeted attacks involving malicious media files delivered via email or removable media could cause localized service interruptions. Organizations in media, entertainment, and telecommunications sectors in Europe should be aware of this vulnerability, especially if they use GPAC in their infrastructure. Additionally, any embedded systems or devices incorporating GPAC for media handling could be susceptible to crashes, potentially affecting operational continuity.

Mitigation Recommendations

To mitigate CVE-2022-43043, organizations should first identify any use of GPAC, particularly development or pre-release versions around 2.1-DEV-rev368-gfd054169b-master. Since no official patches are currently linked, users should consider upgrading to the latest stable GPAC release where this issue may have been resolved or monitor the official GPAC repositories for patches addressing this vulnerability. In the interim, restrict the processing of untrusted or unauthenticated media files, especially those received via email, downloads, or removable media, to prevent triggering the vulnerability. Implement application whitelisting and sandboxing for media processing applications to contain potential crashes and prevent escalation. Educate users on the risks of opening unverified media files and enforce strict local access controls to limit the ability of unprivileged users to execute potentially malicious media processing tasks. For critical systems, consider deploying runtime memory protection tools such as AddressSanitizer or similar to detect and prevent out-of-bounds memory accesses during media processing. Finally, maintain robust incident detection capabilities to identify abnormal application crashes or service disruptions related to media handling.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd7aa6

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 7/5/2025, 2:54:44 AM

Last updated: 2/4/2026, 9:37:19 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats