Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-43238: n/a in n/a

0
Medium
VulnerabilityCVE-2022-43238cvecve-2022-43238
Published: Wed Nov 02 2022 (11/02/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc_put_hevc_qpel_h_3_v_3_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.

AI-Powered Analysis

AILast updated: 06/26/2025, 04:16:54 UTC

Technical Analysis

CVE-2022-43238 is a vulnerability identified in libde265 version 1.0.8, an open-source HEVC/H.265 video codec library used for decoding video streams. The flaw arises from an unknown crash triggered within the function ff_hevc_put_hevc_qpel_h_3_v_3_sse located in the sse-motion.cc source file. This function is involved in motion compensation during video decoding, specifically handling quarter-pixel interpolation in horizontal and vertical directions using SSE (Streaming SIMD Extensions) optimizations. An attacker can craft a maliciously designed HEVC video file that, when processed by libde265, causes the decoder to crash, resulting in a Denial of Service (DoS). The vulnerability does not affect confidentiality or integrity but impacts availability by causing application or service interruptions. The CVSS v3.1 base score is 6.5 (medium severity), with vector AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating that the attack can be performed remotely over the network without privileges but requires user interaction (e.g., opening or playing the crafted video). No known exploits are currently in the wild, and no patches or vendor advisories have been published as of the data provided. The underlying weakness aligns with CWE-400 (Uncontrolled Resource Consumption), suggesting the crash may be due to resource exhaustion or improper handling of input data during motion compensation.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of services or applications that utilize libde265 for HEVC video decoding. This includes media players, streaming platforms, video conferencing tools, and any software or embedded systems relying on this codec. A successful exploitation could lead to application crashes, service downtime, or denial of video playback functionality, affecting user experience and operational continuity. Sectors such as media and entertainment, telecommunications, and any enterprise relying on video processing could be affected. While the vulnerability does not lead to data breaches or code execution, repeated exploitation could be used as a vector for targeted DoS attacks, potentially impacting critical communication or content delivery infrastructures. Given the requirement for user interaction, the risk is mitigated somewhat by user behavior controls but remains significant where untrusted video content is processed automatically or with minimal user oversight.

Mitigation Recommendations

1. Implement strict input validation and sandboxing for video decoding processes to isolate potential crashes and prevent system-wide impact. 2. Restrict or monitor the sources of HEVC video files, especially from untrusted or external origins, to reduce exposure to crafted malicious files. 3. Employ application-level safeguards such as timeout mechanisms and process restarts to recover gracefully from decoder crashes. 4. Where possible, update to newer versions of libde265 or alternative HEVC decoders that have addressed this vulnerability or provide more robust error handling. 5. Educate users and administrators to avoid opening or processing suspicious video files, particularly those received via email or downloaded from unverified sources. 6. Integrate video file scanning with security tools capable of detecting malformed or suspicious HEVC streams. 7. For embedded or specialized systems using libde265, consider disabling HEVC support if not essential or replacing the codec with a more secure alternative.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb8a0

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 4:16:54 AM

Last updated: 2/7/2026, 7:14:25 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats