Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65407: n/a

0
Medium
VulnerabilityCVE-2025-65407cvecve-2025-65407
Published: Mon Dec 01 2025 (12/01/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65407 is a use-after-free vulnerability in the MPEG1or2Demux::newElementaryStream() function of Live555 Streaming Media v2018. 09. 02. An attacker can exploit this by supplying a crafted MPEG Program stream, causing a Denial of Service (DoS) condition. The vulnerability does not impact confidentiality or integrity but can disrupt availability by crashing affected services. Exploitation requires no privileges but does require user interaction to process the malicious stream. No known exploits are currently in the wild, and no patches have been published yet. The CVSS score is 6. 5 (medium severity), reflecting the moderate impact and ease of exploitation. European organizations using Live555 for streaming media processing are at risk, especially those in media, broadcasting, and telecommunications sectors.

AI-Powered Analysis

AILast updated: 12/08/2025, 19:11:39 UTC

Technical Analysis

CVE-2025-65407 is a use-after-free vulnerability identified in the MPEG1or2Demux::newElementaryStream() function within the Live555 Streaming Media library version 2018.09.02. This vulnerability arises when the function improperly manages memory during the handling of MPEG Program streams, leading to a use-after-free condition. An attacker can exploit this flaw by crafting a malicious MPEG Program stream that triggers the vulnerable code path, causing the application to reference freed memory. This results in a Denial of Service (DoS) by crashing the process handling the stream. The vulnerability requires no privileges but does require user interaction, as the malicious stream must be processed by the vulnerable software. The CVSS 3.1 base score is 6.5, with vector AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality or integrity impact, but high impact on availability. No patches or fixes have been published yet, and no known exploits are reported in the wild. The vulnerability is classified under CWE-416 (Use After Free), a common memory corruption issue that can lead to crashes or potentially more severe impacts if exploited further. Live555 is widely used in streaming media applications, including IPTV, video conferencing, and surveillance systems, making this vulnerability relevant to any organization processing MPEG streams using this library.

Potential Impact

The primary impact of CVE-2025-65407 is a Denial of Service condition caused by application crashes when processing malicious MPEG Program streams. For European organizations, this can disrupt media streaming services, video conferencing, and surveillance systems that rely on Live555 Streaming Media. The unavailability of these services can lead to operational downtime, loss of customer trust, and potential financial losses, especially in sectors like broadcasting, telecommunications, and public safety. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modifications are not expected. However, repeated exploitation could degrade service reliability and availability. The ease of exploitation (network vector, no privileges) increases the risk, particularly for organizations that accept MPEG streams from untrusted or external sources. The lack of patches means organizations must rely on mitigations until an official fix is released. Given the widespread use of Live555 in European media infrastructure, the impact could be significant if exploited at scale.

Mitigation Recommendations

1. Restrict and validate all incoming MPEG Program streams, especially those from untrusted or external sources, to prevent processing of maliciously crafted streams. 2. Implement network-level filtering and intrusion detection systems to monitor for abnormal MPEG stream traffic patterns indicative of exploitation attempts. 3. Employ application-level sandboxing or process isolation for services using Live555 to contain crashes and prevent wider system impact. 4. Monitor application logs and system stability closely for signs of crashes or instability related to MPEG stream processing. 5. Engage with vendors or maintainers of Live555 to obtain patches or updates addressing this vulnerability as soon as they become available. 6. Consider temporary workarounds such as disabling MPEG1or2Demux functionality if feasible without disrupting critical services. 7. Educate operational teams about the risk and ensure incident response plans include procedures for handling DoS events related to streaming media. 8. Regularly update and patch all related software components to minimize exposure to known vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692ddeb01fcc71981e87429d

Added to database: 12/1/2025, 6:30:08 PM

Last enriched: 12/8/2025, 7:11:39 PM

Last updated: 1/15/2026, 10:57:51 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats