Skip to main content

CVE-2022-43241: n/a in n/a

Medium
VulnerabilityCVE-2022-43241cvecve-2022-43241
Published: Wed Nov 02 2022 (11/02/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc_put_hevc_qpel_v_3_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.

AI-Powered Analysis

AILast updated: 07/07/2025, 01:25:22 UTC

Technical Analysis

CVE-2022-43241 is a vulnerability identified in libde265 version 1.0.8, a library used for decoding HEVC (High Efficiency Video Coding) video streams. The flaw exists in the function ff_hevc_put_hevc_qpel_v_3_8_sse within the sse-motion.cc source file. Specifically, this vulnerability is a type of out-of-bounds write or memory corruption issue (CWE-787) that can be triggered by processing a specially crafted HEVC video file. When exploited, it causes the application using libde265 to crash, resulting in a Denial of Service (DoS). The vulnerability requires no privileges (PR:N) but does require user interaction (UI:R) in the form of opening or processing a malicious video file. The attack vector is network-based (AV:N), meaning the crafted file can be delivered remotely, for example, via email attachments, downloads, or streaming services. The vulnerability does not impact confidentiality or integrity but severely affects availability by crashing the process handling the video stream. The CVSS v3.1 base score is 6.5, categorized as medium severity. No known public exploits have been reported, and no patches or vendor advisories are currently linked. The vulnerability is particularly relevant for applications and systems that rely on libde265 for HEVC decoding, including media players, streaming platforms, and embedded devices that handle video content. Since HEVC is widely used for high-efficiency video compression, this vulnerability could be leveraged to disrupt services or applications that process video files from untrusted sources.

Potential Impact

For European organizations, the impact of CVE-2022-43241 primarily manifests as service disruption or denial of service in multimedia applications that utilize libde265 for HEVC decoding. This could affect media companies, broadcasters, streaming service providers, and any enterprise using video conferencing or video processing tools that incorporate this library. The DoS could lead to downtime, degraded user experience, and potential operational interruptions, especially in environments where video content is critical. While the vulnerability does not allow data theft or code execution, repeated exploitation could be used to disrupt business operations or as part of a larger attack chain. Organizations handling sensitive or critical video streams should be aware of this risk. Additionally, embedded systems or IoT devices in sectors like automotive, healthcare, or industrial control that use libde265 might also be vulnerable to crashes, potentially impacting safety or operational continuity.

Mitigation Recommendations

To mitigate CVE-2022-43241, organizations should first identify all software and devices that incorporate libde265 version 1.0.8 or earlier. Since no official patch is currently linked, consider the following steps: 1) Restrict or filter untrusted HEVC video files from unknown or suspicious sources, especially in email attachments or downloads. 2) Employ application whitelisting and sandboxing techniques for media players or video processing applications to contain crashes and prevent escalation. 3) Monitor logs and application behavior for crashes related to video decoding to detect potential exploitation attempts. 4) Where possible, update libde265 to a later version if available or switch to alternative HEVC decoding libraries that have addressed this vulnerability. 5) Implement network-level protections such as intrusion detection systems (IDS) tuned to detect anomalous video file traffic patterns. 6) Educate users about the risks of opening video files from untrusted sources. 7) For embedded systems, coordinate with vendors for firmware updates or mitigations and consider isolating vulnerable devices from critical networks until patched.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc9d4

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 1:25:22 AM

Last updated: 8/11/2025, 11:26:48 PM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats