Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12343: Double Free

0
Low
VulnerabilityCVE-2025-12343cvecve-2025-12343
Published: Wed Feb 18 2026 (02/18/2026, 20:28:08 UTC)
Source: CVE Database V5

Description

A flaw was found in FFmpeg’s TensorFlow backend within the libavfilter/dnn_backend_tf.c source file. The issue occurs in the dnn_execute_model_tf() function, where a task object is freed multiple times in certain error-handling paths. This redundant memory deallocation can lead to a double-free condition, potentially causing FFmpeg or any application using it to crash when processing TensorFlow-based DNN models. This results in a denial-of-service scenario but does not allow arbitrary code execution under normal conditions.

AI-Powered Analysis

AILast updated: 02/19/2026, 12:02:07 UTC

Technical Analysis

CVE-2025-12343 identifies a double-free vulnerability within FFmpeg's TensorFlow backend, specifically in the source file libavfilter/dnn_backend_tf.c inside the dnn_execute_model_tf() function. The vulnerability occurs due to improper memory management where a task object is freed multiple times along certain error-handling paths. This redundant deallocation can corrupt the heap, leading to application instability or crashes when FFmpeg or any dependent application processes TensorFlow-based deep neural network (DNN) models. The flaw does not permit arbitrary code execution or privilege escalation under normal conditions, limiting its impact to denial-of-service (DoS) scenarios. The affected version is FFmpeg 6.1. Exploitation requires local access and user interaction, as indicated by the CVSS vector (AV:L/AC:L/PR:N/UI:R). No known exploits have been reported in the wild. The vulnerability highlights the importance of careful memory management in complex multimedia processing pipelines, especially when integrating machine learning frameworks like TensorFlow. While the immediate risk is service disruption, the flaw could be leveraged in targeted attacks to degrade system availability or disrupt media processing workflows.

Potential Impact

For European organizations, the primary impact is denial-of-service through application crashes when processing TensorFlow-based DNN models using FFmpeg 6.1. This could affect media companies, broadcasters, and technology firms relying on FFmpeg for video/audio processing integrated with AI models. Service interruptions may lead to operational delays, reduced productivity, and potential financial losses, especially in environments with high media throughput or real-time processing requirements. Since the vulnerability does not allow code execution or data compromise, confidentiality and integrity risks are minimal. However, availability degradation could impact critical media services or AI-driven content workflows. Organizations with automated pipelines or user-facing applications using FFmpeg's TensorFlow backend are particularly at risk. The lack of known exploits reduces immediate threat, but unpatched systems remain vulnerable to accidental crashes or targeted DoS attempts.

Mitigation Recommendations

Organizations should monitor FFmpeg releases and apply patches addressing CVE-2025-12343 promptly once available. Until patched, avoid processing untrusted or malformed TensorFlow DNN models with FFmpeg 6.1 to reduce crash risk. Implement robust input validation and error handling in applications leveraging FFmpeg's TensorFlow backend to prevent triggering the double-free condition. Employ runtime memory protection tools such as AddressSanitizer or similar to detect and mitigate memory corruption during development and testing. Restrict local user permissions and limit user interaction capabilities on systems running vulnerable FFmpeg versions to reduce exploitation likelihood. Consider isolating media processing workloads in sandboxed or containerized environments to contain potential crashes. Regularly audit and update dependencies to minimize exposure to known vulnerabilities in multimedia frameworks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2025-10-27T13:03:10.400Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996fb458fb9188dea8c0122

Added to database: 2/19/2026, 12:00:05 PM

Last enriched: 2/19/2026, 12:02:07 PM

Last updated: 2/21/2026, 12:16:51 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats