Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-44331: n/a

0
High
VulnerabilityCVE-2024-44331cvecve-2024-44331
Published: Tue Oct 22 2024 (10/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Incorrect Access Control in GStreamer RTSP server 1.25.0 in gst-rtsp-server/rtsp-media.c allows remote attackers to cause a denial of service via a series of specially crafted hexstream requests.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:34:58 UTC

Technical Analysis

CVE-2024-44331 is an access control vulnerability identified in the GStreamer RTSP server version 1.25.0, specifically within the gst-rtsp-server/rtsp-media.c source file. The issue arises from improper validation or enforcement of access controls when processing incoming RTSP hexstream requests. Attackers can exploit this flaw remotely by sending a series of specially crafted hexstream requests that the server mishandles, leading to a denial of service (DoS) condition. This vulnerability is classified under CWE-120, indicating a buffer-related issue, which suggests that the crafted requests may cause memory corruption or buffer overflows resulting in server crashes or service interruptions. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity loss. Although no patches are currently linked, the vulnerability was published on October 22, 2024, and no known exploits have been reported in the wild. The vulnerability affects streaming media infrastructures relying on GStreamer RTSP server 1.25.0, which is commonly used in multimedia applications, surveillance systems, and real-time streaming services.

Potential Impact

The primary impact of CVE-2024-44331 is the disruption of availability for services relying on the GStreamer RTSP server 1.25.0. Organizations using this server for real-time streaming media, such as video surveillance, broadcasting, or multimedia delivery, may experience service outages or crashes if targeted by an attacker exploiting this vulnerability. This can lead to operational downtime, loss of service continuity, and potential reputational damage. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, the denial of service could be leveraged as part of a larger attack chain or to cause disruption during critical operations. The ease of exploitation without authentication or user interaction increases the risk, especially for publicly accessible RTSP servers. The lack of known exploits in the wild currently limits immediate widespread impact but does not preclude future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2024-44331, organizations should first monitor for any official patches or updates from the GStreamer project and apply them promptly once available. In the absence of a patch, administrators should consider implementing network-level protections such as firewall rules or intrusion prevention systems (IPS) to restrict or filter incoming RTSP traffic to trusted sources only. Rate limiting or connection throttling on RTSP ports can reduce the risk of exploitation via crafted request floods. Additionally, deploying RTSP servers behind VPNs or within segmented network zones can limit exposure to untrusted networks. Logging and monitoring RTSP server activity for unusual or malformed requests can help detect attempted exploitation. Where feasible, upgrading to a newer, unaffected version of the GStreamer RTSP server or applying vendor-recommended workarounds is advised. Finally, conducting regular security assessments and penetration tests on streaming infrastructure can identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cdab7ef31ef0b569919

Added to database: 2/25/2026, 9:42:50 PM

Last enriched: 2/28/2026, 6:34:58 AM

Last updated: 4/12/2026, 7:52:25 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses