Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61147: n/a

0
Medium
VulnerabilityCVE-2025-61147cvecve-2025-61147
Published: Mon Feb 23 2026 (02/23/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

strukturag libde265 commit d9fea9d wa discovered to contain a segmentation fault via the component decoder_context::compute_framedrop_table().

AI-Powered Analysis

AILast updated: 02/23/2026, 21:04:41 UTC

Technical Analysis

CVE-2025-61147 is a vulnerability identified in the strukturag libde265 open-source library, which is widely used for decoding HEVC/H.265 video streams. The issue resides in the decoder_context::compute_framedrop_table() function, where a segmentation fault can be triggered by malformed or maliciously crafted video data. A segmentation fault indicates an attempt by the program to access an invalid memory location, which typically results in a crash of the application using the library. This vulnerability could be exploited by an attacker who supplies specially crafted video content to an application relying on libde265, causing the application to crash and potentially leading to denial of service (DoS). There is no indication that this vulnerability allows for remote code execution or privilege escalation. The vulnerability was reserved in September 2025 and published in February 2026, but no CVSS score has been assigned yet, and no patches or known exploits are currently available. The lack of a CVSS score and known exploits suggests the vulnerability is newly discovered and may require further analysis and patch development. The libde265 library is used in various media players, streaming platforms, and video processing tools, making this vulnerability relevant to organizations handling HEVC video content.

Potential Impact

The primary impact of CVE-2025-61147 is the potential for denial of service through application crashes when processing maliciously crafted HEVC video streams. This can disrupt media playback, streaming services, or any application relying on libde265 for video decoding. For organizations, this could mean service interruptions, degraded user experience, or operational downtime, especially in environments where video streaming is critical. Although no remote code execution or data breach is indicated, repeated crashes could be exploited to degrade service availability. The impact is more significant for service providers, media companies, and enterprises that integrate libde265 in their video processing pipelines. Since no known exploits exist yet, the immediate risk is moderate, but the vulnerability could be weaponized if attackers develop reliable exploit techniques. The absence of patches means that affected systems remain vulnerable until updates are released. Overall, the threat affects confidentiality minimally but impacts availability and integrity of video services.

Mitigation Recommendations

Organizations should proactively monitor for official patches or updates to the libde265 library addressing CVE-2025-61147 and apply them promptly once available. Until patches are released, it is advisable to implement input validation and sanitization on all HEVC video streams to detect and block malformed or suspicious content that could trigger the vulnerability. Employing sandboxing or isolating video decoding processes can limit the impact of crashes and prevent them from affecting critical systems. For applications using libde265, consider upgrading to the latest stable versions regularly and testing video inputs in controlled environments. Network-level controls such as filtering untrusted video sources or restricting access to video upload endpoints can reduce exposure. Additionally, monitoring application logs for crashes related to video decoding can help detect exploitation attempts early. Collaboration with vendors and open-source communities to expedite patch development is recommended. Finally, maintain incident response plans to address potential denial of service incidents caused by this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699cbd8cbe58cf853bc4b45d

Added to database: 2/23/2026, 8:50:20 PM

Last enriched: 2/23/2026, 9:04:41 PM

Last updated: 2/24/2026, 4:12:58 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats