Skip to main content

CVE-2022-45343: n/a in n/a

High
VulnerabilityCVE-2022-45343cvecve-2022-45343
Published: Tue Nov 29 2022 (11/29/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

GPAC v2.1-DEV-rev478-g696e6f868-master was discovered to contain a heap use-after-free via the Q_IsTypeOn function at /gpac/src/bifs/unquantize.c.

AI-Powered Analysis

AILast updated: 07/03/2025, 06:57:12 UTC

Technical Analysis

CVE-2022-45343 is a high-severity heap use-after-free vulnerability identified in the GPAC multimedia framework, specifically in the function Q_IsTypeOn located in the source file /gpac/src/bifs/unquantize.c. GPAC is an open-source multimedia framework used for packaging, streaming, and playing multimedia content, including support for MPEG-4 and other media formats. The vulnerability arises when the function improperly handles memory, leading to a use-after-free condition on the heap. This type of vulnerability occurs when a program continues to use a pointer after the memory it points to has been freed, potentially allowing an attacker to execute arbitrary code, cause a denial of service (crash), or corrupt memory. The CVSS v3.1 base score is 7.8, indicating a high severity level. The vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H indicates that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is needed (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches or vendor-specific product details are provided in the information. The vulnerability is categorized under CWE-416, which corresponds to use-after-free errors. This vulnerability could be exploited by convincing a user to open or process a specially crafted multimedia file using the vulnerable GPAC version, leading to potential arbitrary code execution or system compromise.

Potential Impact

For European organizations, the impact of CVE-2022-45343 depends largely on the deployment of GPAC in their multimedia processing environments. Organizations involved in media production, streaming services, broadcasting, or any application that uses GPAC for media packaging or playback are at risk. Successful exploitation could lead to unauthorized code execution, data breaches, or service disruption. This is particularly critical for industries handling sensitive multimedia content or intellectual property, such as media companies, broadcasters, and content delivery networks. Additionally, if GPAC is embedded in consumer devices or software widely used in Europe, exploitation could affect end-user systems, leading to broader security incidents. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where users may open untrusted media files. The high impact on confidentiality, integrity, and availability means that exploitation could result in significant operational and reputational damage, data loss, and potential regulatory consequences under GDPR if personal data is compromised.

Mitigation Recommendations

To mitigate CVE-2022-45343, European organizations should: 1) Identify and inventory all systems and applications using GPAC, particularly versions around v2.1-DEV-rev478-g696e6f868-master or similar development builds. 2) Apply patches or updates from the GPAC project as soon as they become available; if no official patch exists, consider applying community or vendor-provided fixes or backporting patches from later versions. 3) Restrict local access to systems running GPAC to trusted users only, minimizing the risk of local exploitation. 4) Implement strict media file validation and scanning policies to prevent opening or processing untrusted or malicious multimedia files. 5) Educate users about the risks of opening untrusted media content and enforce least privilege principles to reduce the impact of potential exploitation. 6) Monitor systems for unusual behavior or crashes related to media processing components and employ endpoint detection and response (EDR) tools to detect exploitation attempts. 7) In environments where GPAC is embedded in consumer devices or third-party software, coordinate with vendors to ensure timely updates and security patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbebacc

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 7/3/2025, 6:57:12 AM

Last updated: 8/5/2025, 12:53:18 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats