Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65407: n/a

0
Unknown
VulnerabilityCVE-2025-65407cvecve-2025-65407
Published: Mon Dec 01 2025 (12/01/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A use-after-free in the MPEG1or2Demux::newElementaryStream() function of Live555 Streaming Media v2018.09.02 allows attackers to cause a Denial of Service (DoS) via supplying a crafted MPEG Program stream.

AI-Powered Analysis

AILast updated: 12/01/2025, 18:45:11 UTC

Technical Analysis

CVE-2025-65407 is a use-after-free vulnerability identified in the MPEG1or2Demux::newElementaryStream() function within the Live555 Streaming Media library, version 2018.09.02. Live555 is an open-source multimedia streaming library widely used for handling RTP/RTSP streaming protocols and MPEG transport streams. The vulnerability arises when the function processes MPEG Program streams; a specially crafted stream can trigger a use-after-free condition, leading to memory corruption. This memory corruption can cause the affected application to crash, resulting in a denial of service (DoS). The flaw does not require prior authentication, meaning any attacker capable of delivering a malicious MPEG stream to the vulnerable system can exploit it. The lack of a CVSS score and absence of patches indicate this is a newly disclosed vulnerability. No known exploits have been reported in the wild, but the potential for disruption is significant due to the nature of the flaw. Systems that ingest or relay MPEG streams using Live555, such as streaming servers, media players, and embedded devices, are at risk. The vulnerability could be leveraged to disrupt media delivery services or streaming-dependent applications, impacting availability. Since Live555 is often embedded in various commercial and open-source products, the scope of affected systems is broad. The vulnerability's exploitation requires the attacker to supply a malicious MPEG Program stream, which could be delivered over the network or via compromised media files. This threat primarily impacts the availability of services relying on Live555 for streaming media processing.

Potential Impact

For European organizations, the primary impact of CVE-2025-65407 is the potential denial of service on streaming media infrastructure. This could disrupt media delivery platforms, IPTV services, video conferencing systems, and other applications relying on Live555 for handling MPEG streams. Service outages could affect customer experience, operational continuity, and revenue, especially for media companies and telecom providers. Critical infrastructure using streaming for surveillance or communication could also be impacted, leading to operational risks. The vulnerability could be exploited remotely without authentication, increasing the attack surface. Organizations processing untrusted or external MPEG streams are particularly vulnerable. The lack of known exploits currently limits immediate risk, but the potential for future exploitation remains. The impact on confidentiality and integrity is minimal, as the vulnerability primarily causes crashes rather than data leakage or modification. However, repeated exploitation could lead to broader service disruptions and potential cascading failures in dependent systems.

Mitigation Recommendations

To mitigate CVE-2025-65407, European organizations should first identify all systems using Live555 Streaming Media, especially version 2018.09.02 or similar. Since no patches are currently available, organizations should implement strict input validation and filtering to block or quarantine untrusted MPEG Program streams before processing. Network segmentation can limit exposure by isolating streaming servers from untrusted networks. Monitoring for abnormal application crashes or service interruptions can provide early detection of exploitation attempts. Employing application-level firewalls or intrusion prevention systems with signatures targeting malformed MPEG streams can help prevent attacks. Organizations should also plan for timely patching once updates are released by Live555 maintainers. For embedded devices or third-party products using Live555, coordinate with vendors to obtain security updates or workarounds. Additionally, consider deploying fallback or redundancy mechanisms for critical streaming services to maintain availability during potential attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692ddeb01fcc71981e87429d

Added to database: 12/1/2025, 6:30:08 PM

Last enriched: 12/1/2025, 6:45:11 PM

Last updated: 12/1/2025, 7:39:04 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats