Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1417: NULL Pointer Dereference in GPAC

0
Medium
VulnerabilityCVE-2026-1417cvecve-2026-1417
Published: Mon Jan 26 2026 (01/26/2026, 03:32:07 UTC)
Source: CVE Database V5
Product: GPAC

Description

A weakness has been identified in GPAC up to 2.4.0. Affected by this issue is the function dump_isom_rtp of the file applications/mp4box/filedump.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. Patch name: f96bd57c3ccdcde4335a0be28cd3e8fe296993de. Applying a patch is the recommended action to fix this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:27:21 UTC

Technical Analysis

CVE-2026-1417 is a vulnerability in the GPAC multimedia framework, specifically affecting versions 2.0 through 2.4.0. The issue resides in the dump_isom_rtp function located in applications/mp4box/filedump.c, where improper handling leads to a null pointer dereference. This occurs when the function attempts to access or manipulate memory through a pointer that has not been properly initialized or has been set to null, causing the application to crash. The vulnerability requires local access with low privileges to exploit, meaning an attacker must have some level of access to the system to trigger the flaw. No user interaction is necessary once local access is obtained. The vulnerability has a CVSS 4.8 score, reflecting a medium severity level due to its limited impact and exploitation conditions. The exploit code has been publicly released, increasing the risk of opportunistic attacks. The primary consequence is denial of service through application crashes, potentially disrupting multimedia processing workflows. The issue does not appear to allow privilege escalation, remote code execution, or data leakage. The recommended mitigation is to apply the patch identified by commit f96bd57c3ccdcde4335a0be28cd3e8fe296993de, which corrects the null pointer dereference by adding proper validation and error handling in the affected function.

Potential Impact

The primary impact of CVE-2026-1417 is denial of service due to application crashes when the vulnerable function is triggered. For organizations relying on GPAC for media processing, streaming, or content packaging, this could lead to service interruptions, degraded user experience, or operational delays. Since exploitation requires local access, the threat is mostly relevant in environments where multiple users share systems or where attackers have already gained limited access. The vulnerability does not allow remote exploitation or privilege escalation, limiting its impact scope. However, the availability disruption could affect media companies, broadcasters, content delivery networks, and any enterprise using GPAC in their multimedia pipelines. The public availability of exploit code increases the risk of exploitation by insiders or attackers with foothold access. While no known widespread attacks exist, unpatched systems remain vulnerable to targeted denial of service attempts.

Mitigation Recommendations

To mitigate CVE-2026-1417, organizations should immediately apply the official patch identified by commit f96bd57c3ccdcde4335a0be28cd3e8fe296993de to all affected GPAC versions (2.0 through 2.4.0). Additionally, restrict local access to systems running GPAC to trusted users only and implement strict access controls and monitoring to detect unauthorized local activity. Employ application whitelisting and endpoint detection to identify attempts to exploit the vulnerability. Regularly update and audit multimedia processing environments to ensure no outdated GPAC versions remain in use. Consider isolating GPAC processing workloads in sandboxed or containerized environments to limit the impact of potential crashes. Finally, maintain comprehensive logging and alerting on application failures to quickly respond to denial of service incidents.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-25T09:56:56.395Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6976e11c4623b1157c3c0df2

Added to database: 1/26/2026, 3:35:56 AM

Last enriched: 2/23/2026, 10:27:21 PM

Last updated: 3/25/2026, 1:28:18 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses