Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70308: n/a

0
High
VulnerabilityCVE-2025-70308cvecve-2025-70308
Published: Thu Jan 15 2026 (01/15/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An out-of-bounds read in the GSF demuxer filter component of GPAC v2.4.0 allows attackers to cause a Denial of Service (DoS) via a crafted .gsf file.

AI-Powered Analysis

AILast updated: 01/15/2026, 16:39:53 UTC

Technical Analysis

CVE-2025-70308 is a security vulnerability identified in the GPAC multimedia framework version 2.4.0, specifically within the GSF demuxer filter component. The flaw is an out-of-bounds read error triggered by processing a specially crafted .gsf file. An out-of-bounds read occurs when the software reads data outside the allocated memory buffer, which can lead to application crashes or undefined behavior. In this case, the vulnerability results in a Denial of Service (DoS) condition, where the affected application or system component can be forced to crash or become unresponsive, disrupting normal operations. The vulnerability does not currently have a CVSS score, and no public exploits have been reported. Exploitation requires the victim to process a malicious .gsf file, which may occur through user interaction or automated media processing workflows. The vulnerability affects the availability of the system by causing crashes but does not appear to allow code execution or data leakage. GPAC is widely used in multimedia applications for media packaging, streaming, and playback, making this vulnerability relevant to organizations handling media content. The lack of a patch or mitigation details suggests that users should monitor for updates from GPAC maintainers and consider interim protective measures.

Potential Impact

For European organizations, the primary impact of CVE-2025-70308 is service disruption due to Denial of Service attacks targeting media processing pipelines that utilize GPAC. This can affect broadcasters, streaming service providers, media production companies, and any enterprise relying on GPAC for multimedia content handling. Disruptions could lead to downtime, loss of service availability, and potential reputational damage. In critical environments such as live broadcasting or media delivery platforms, this could translate into significant operational and financial losses. Since the vulnerability requires processing a crafted .gsf file, attackers might exploit publicly accessible media upload or processing services, or target internal workflows that handle untrusted media files. The impact on confidentiality and integrity appears minimal, but availability degradation can have cascading effects on business continuity and customer trust.

Mitigation Recommendations

1. Monitor GPAC official channels for security updates and apply patches promptly once available. 2. Until a patch is released, restrict or disable processing of untrusted .gsf files in media workflows. 3. Implement strict input validation and sanitization for media files entering the system to detect and block malformed .gsf files. 4. Use sandboxing or containerization techniques to isolate media processing components, limiting the impact of crashes. 5. Employ runtime monitoring and automated recovery mechanisms to detect and restart failed media processing services quickly. 6. Review and harden access controls on media upload and processing interfaces to reduce exposure to crafted files. 7. Conduct security awareness training for staff handling media ingestion to recognize suspicious files.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696916c94c611209ad420da4

Added to database: 1/15/2026, 4:33:13 PM

Last enriched: 1/15/2026, 4:39:53 PM

Last updated: 1/15/2026, 5:38:57 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats