Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-43244: n/a in n/a

0
Medium
VulnerabilityCVE-2022-43244cvecve-2022-43244
Published: Wed Nov 02 2022 (11/02/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_qpel_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.

AI-Powered Analysis

AILast updated: 07/07/2025, 01:41:34 UTC

Technical Analysis

CVE-2022-43244 is a heap-buffer-overflow vulnerability identified in libde265 version 1.0.8, specifically within the function put_qpel_fallback<unsigned short> in the fallback-motion.cc source file. Libde265 is an open-source H.265/HEVC video decoder library used to decode video streams encoded with the H.265 standard. The vulnerability arises due to improper handling of memory buffers when processing certain crafted video files, leading to a heap buffer overflow condition. This flaw can be triggered remotely by an attacker supplying a maliciously crafted video file that exploits the buffer overflow, causing the application using libde265 to crash or become unresponsive, resulting in a Denial of Service (DoS). The vulnerability does not affect confidentiality or integrity directly, as it does not allow code execution or data manipulation, but it impacts availability by crashing the decoder or the host application. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R) such as opening or playing a malicious video file. The scope remains unchanged (S:U), and the impact affects availability only (A:H). There are no known exploits in the wild as of the published date, and no official patches or vendor information is provided in the source data. The vulnerability is classified under CWE-787 (Out-of-bounds Write).

Potential Impact

For European organizations, the primary impact of CVE-2022-43244 is the potential disruption of services that rely on libde265 for video decoding. This includes media streaming platforms, video conferencing tools, digital signage systems, and any software or embedded devices that process H.265 video streams using this library. A successful exploitation could cause application crashes or service interruptions, leading to degraded user experience, operational downtime, or loss of availability of critical multimedia services. While the vulnerability does not allow data theft or system takeover, repeated or targeted DoS attacks could be leveraged to disrupt business operations or degrade service reliability. Organizations in sectors such as media and entertainment, telecommunications, education (e-learning platforms), and public services that utilize video content extensively may be particularly affected. Additionally, embedded systems or IoT devices in industrial or smart city deployments using libde265 could face stability issues, potentially impacting critical infrastructure components.

Mitigation Recommendations

To mitigate CVE-2022-43244, European organizations should first identify all software and systems that incorporate libde265 version 1.0.8 or earlier. Since no official patch is referenced, organizations should monitor the libde265 project repositories and security advisories for updates or patches addressing this vulnerability. In the interim, organizations can implement the following specific measures: 1) Restrict or filter untrusted video content sources to reduce exposure to maliciously crafted video files. 2) Employ sandboxing or containerization for applications that decode video streams to isolate potential crashes and prevent broader system impact. 3) Use alternative, patched video decoding libraries or updated versions of libde265 once available. 4) Implement robust input validation and scanning of video files before processing, using antivirus or specialized media file scanners that can detect malformed or suspicious video content. 5) Educate users to avoid opening or playing video files from untrusted or unknown sources, as user interaction is required for exploitation. 6) Monitor application logs and system stability to detect abnormal crashes or DoS symptoms potentially related to this vulnerability. 7) For embedded or IoT devices, coordinate with vendors to obtain firmware updates or mitigations and consider network segmentation to limit exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdcae7

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 1:41:34 AM

Last updated: 2/7/2026, 2:37:45 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats