Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10256: NULL Pointer Dereference

0
Medium
VulnerabilityCVE-2025-10256cvecve-2025-10256
Published: Wed Feb 18 2026 (02/18/2026, 20:26:46 UTC)
Source: CVE Database V5

Description

A NULL pointer dereference vulnerability exists in FFmpeg’s Firequalizer filter (libavfilter/af_firequalizer.c) due to a missing check on the return value of av_malloc_array() in the config_input() function. An attacker could exploit this by tricking a victim into processing a crafted media file with the Firequalizer filter enabled, causing the application to dereference a NULL pointer and crash, leading to denial of service.

AI-Powered Analysis

AILast updated: 02/19/2026, 12:01:52 UTC

Technical Analysis

CVE-2025-10256 is a vulnerability identified in FFmpeg version 3.2, specifically within the Firequalizer audio filter component (libavfilter/af_firequalizer.c). The root cause is a missing validation check on the return value of the av_malloc_array() function inside the config_input() function. av_malloc_array() is responsible for allocating memory arrays, and if it fails, it returns NULL. Without verifying this return value, the code proceeds to dereference the NULL pointer, causing the application to crash. An attacker can exploit this by crafting a malicious media file designed to trigger this code path when processed with the Firequalizer filter enabled. The consequence is a denial of service (DoS) due to application crash, impacting availability but not confidentiality or integrity. The vulnerability is remotely exploitable without requiring authentication or user interaction, as simply processing the crafted media file is sufficient. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the ease of exploitation and limited impact scope. No known exploits have been reported in the wild to date. The vulnerability highlights the importance of robust error handling in multimedia processing libraries, which are widely used in various applications including media players, streaming services, and content creation tools.

Potential Impact

For European organizations, the primary impact of CVE-2025-10256 is denial of service, which can disrupt media processing workflows, streaming services, or any application relying on FFmpeg 3.2 with the Firequalizer filter enabled. This could lead to service outages, degraded user experience, and potential operational downtime. Organizations in sectors such as media production, broadcasting, online streaming platforms, and content delivery networks are particularly at risk. While the vulnerability does not compromise data confidentiality or integrity, repeated or targeted exploitation could cause significant availability issues, potentially affecting business continuity and reputation. Additionally, denial of service in critical media infrastructure could have cascading effects on dependent services or customers. Given the widespread use of FFmpeg in open-source and commercial products, the impact could be broad if unpatched systems are present in the environment.

Mitigation Recommendations

To mitigate CVE-2025-10256, organizations should first identify all instances of FFmpeg version 3.2 in their environment, especially those using the Firequalizer filter. Immediate mitigation includes disabling the Firequalizer filter when processing media files from untrusted sources to prevent triggering the vulnerability. Monitoring and filtering incoming media files for suspicious or malformed content can reduce exposure. Organizations should track FFmpeg releases and apply patches or upgrade to a fixed version as soon as it becomes available. If upgrading is not immediately feasible, consider sandboxing or isolating media processing components to contain potential crashes and minimize impact on critical systems. Implementing robust input validation and employing media file scanning tools can further reduce risk. Finally, maintain comprehensive logging and alerting to detect abnormal crashes or service disruptions indicative of exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2025-09-11T06:11:12.091Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996fb458fb9188dea8c011c

Added to database: 2/19/2026, 12:00:05 PM

Last enriched: 2/19/2026, 12:01:52 PM

Last updated: 2/21/2026, 12:13:54 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats