Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-43241: n/a in n/a

0
Medium
VulnerabilityCVE-2022-43241cvecve-2022-43241
Published: Wed Nov 02 2022 (11/02/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Libde265 v1.0.8 was discovered to contain an unknown crash via ff_hevc_put_hevc_qpel_v_3_8_sse in sse-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.

AI-Powered Analysis

AILast updated: 07/07/2025, 01:25:22 UTC

Technical Analysis

CVE-2022-43241 is a vulnerability identified in libde265 version 1.0.8, a library used for decoding HEVC (High Efficiency Video Coding) video streams. The flaw exists in the function ff_hevc_put_hevc_qpel_v_3_8_sse within the sse-motion.cc source file. Specifically, this vulnerability is a type of out-of-bounds write or memory corruption issue (CWE-787) that can be triggered by processing a specially crafted HEVC video file. When exploited, it causes the application using libde265 to crash, resulting in a Denial of Service (DoS). The vulnerability requires no privileges (PR:N) but does require user interaction (UI:R) in the form of opening or processing a malicious video file. The attack vector is network-based (AV:N), meaning the crafted file can be delivered remotely, for example, via email attachments, downloads, or streaming services. The vulnerability does not impact confidentiality or integrity but severely affects availability by crashing the process handling the video stream. The CVSS v3.1 base score is 6.5, categorized as medium severity. No known public exploits have been reported, and no patches or vendor advisories are currently linked. The vulnerability is particularly relevant for applications and systems that rely on libde265 for HEVC decoding, including media players, streaming platforms, and embedded devices that handle video content. Since HEVC is widely used for high-efficiency video compression, this vulnerability could be leveraged to disrupt services or applications that process video files from untrusted sources.

Potential Impact

For European organizations, the impact of CVE-2022-43241 primarily manifests as service disruption or denial of service in multimedia applications that utilize libde265 for HEVC decoding. This could affect media companies, broadcasters, streaming service providers, and any enterprise using video conferencing or video processing tools that incorporate this library. The DoS could lead to downtime, degraded user experience, and potential operational interruptions, especially in environments where video content is critical. While the vulnerability does not allow data theft or code execution, repeated exploitation could be used to disrupt business operations or as part of a larger attack chain. Organizations handling sensitive or critical video streams should be aware of this risk. Additionally, embedded systems or IoT devices in sectors like automotive, healthcare, or industrial control that use libde265 might also be vulnerable to crashes, potentially impacting safety or operational continuity.

Mitigation Recommendations

To mitigate CVE-2022-43241, organizations should first identify all software and devices that incorporate libde265 version 1.0.8 or earlier. Since no official patch is currently linked, consider the following steps: 1) Restrict or filter untrusted HEVC video files from unknown or suspicious sources, especially in email attachments or downloads. 2) Employ application whitelisting and sandboxing techniques for media players or video processing applications to contain crashes and prevent escalation. 3) Monitor logs and application behavior for crashes related to video decoding to detect potential exploitation attempts. 4) Where possible, update libde265 to a later version if available or switch to alternative HEVC decoding libraries that have addressed this vulnerability. 5) Implement network-level protections such as intrusion detection systems (IDS) tuned to detect anomalous video file traffic patterns. 6) Educate users about the risks of opening video files from untrusted sources. 7) For embedded systems, coordinate with vendors for firmware updates or mitigations and consider isolating vulnerable devices from critical networks until patched.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc9d4

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 1:25:22 AM

Last updated: 2/7/2026, 6:33:12 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats