Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10256: NULL Pointer Dereference

0
Medium
VulnerabilityCVE-2025-10256cvecve-2025-10256
Published: Wed Feb 18 2026 (02/18/2026, 20:26:46 UTC)
Source: CVE Database V5

Description

A NULL pointer dereference vulnerability exists in FFmpeg’s Firequalizer filter (libavfilter/af_firequalizer.c) due to a missing check on the return value of av_malloc_array() in the config_input() function. An attacker could exploit this by tricking a victim into processing a crafted media file with the Firequalizer filter enabled, causing the application to dereference a NULL pointer and crash, leading to denial of service.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:05:34 UTC

Technical Analysis

CVE-2025-10256 is a NULL pointer dereference vulnerability identified in the Firequalizer audio filter component of FFmpeg, specifically in the source file libavfilter/af_firequalizer.c. The root cause is a missing validation of the return value from av_malloc_array() within the config_input() function. When av_malloc_array() fails and returns NULL, the subsequent code attempts to dereference this NULL pointer, leading to a crash of the application. This vulnerability can be triggered by an attacker who crafts a specially designed media file that, when processed with the Firequalizer filter enabled, causes the application to dereference the NULL pointer. The result is a denial of service (DoS) condition due to application crash. The vulnerability affects FFmpeg version 3.2. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:L) without affecting confidentiality or integrity. No patches or exploits are currently documented, but the vulnerability is publicly known and published as of February 18, 2026.

Potential Impact

The primary impact of CVE-2025-10256 is a denial of service caused by application crashes when processing maliciously crafted media files with the Firequalizer filter enabled. This can disrupt media processing workflows, streaming services, or any application relying on FFmpeg 3.2 for audio filtering. The vulnerability does not compromise data confidentiality or integrity but can cause service outages, potentially affecting user experience and operational continuity. Organizations that automate media transcoding, streaming, or editing using vulnerable FFmpeg versions are at risk of unexpected downtime. Since exploitation requires no privileges or user interaction, attackers can remotely trigger crashes simply by delivering crafted media files, increasing the threat surface. However, the absence of known exploits in the wild suggests limited active exploitation at this time.

Mitigation Recommendations

To mitigate CVE-2025-10256, organizations should upgrade FFmpeg to a version where this vulnerability is patched; if no official patch is available, consider backporting the fix by adding proper NULL checks on av_malloc_array() return values in the Firequalizer filter code. As an immediate workaround, disable the Firequalizer filter in media processing pipelines if feasible, especially when processing untrusted media files. Implement input validation and media file sanitization to detect and reject suspicious or malformed audio files before processing. Employ application-level monitoring to detect crashes or abnormal terminations related to FFmpeg processes and automate restarts or alerts. Network-level controls such as filtering or sandboxing media processing services can limit exposure to crafted files from untrusted sources. Finally, maintain updated threat intelligence to respond promptly if exploitation attempts emerge.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2025-09-11T06:11:12.091Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996fb458fb9188dea8c011c

Added to database: 2/19/2026, 12:00:05 PM

Last enriched: 2/28/2026, 12:05:34 PM

Last updated: 4/5/2026, 4:13:23 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses