CVE-2026-33164: CWE-122: Heap-based Buffer Overflow in strukturag libde265
libde265 is an open source implementation of the h.265 video codec. Prior to version 1.0.17, a malformed H.265 PPS NAL unit causes a segmentation fault in pic_parameter_set::set_derived_values(). This issue has been patched in version 1.0.17.
AI Analysis
Technical Summary
CVE-2026-33164 is a heap-based buffer overflow vulnerability identified in the libde265 library, an open-source implementation of the H.265/HEVC video codec. The vulnerability arises when the library processes a malformed Picture Parameter Set (PPS) Network Abstraction Layer (NAL) unit. Specifically, the flaw is triggered in the pic_parameter_set::set_derived_values() function, which fails to properly validate or handle the malformed input, leading to a heap overflow and subsequent segmentation fault. This can cause the application using libde265 to crash or potentially allow an attacker to execute arbitrary code remotely. The vulnerability affects all versions of libde265 prior to 1.0.17, where the issue has been patched. The CVSS 4.0 base score is 8.7, reflecting a high severity due to the vulnerability's remote exploitability without any required privileges or user interaction, and its potential to cause high impact on availability and integrity. The vulnerability does not require authentication or user interaction, making it easier to exploit in scenarios where untrusted video streams are processed. Although no exploits have been reported in the wild yet, the nature of the flaw and the widespread use of libde265 in media players, streaming services, and embedded devices make it a significant security concern. The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow), a common and dangerous class of memory corruption bugs that can lead to serious security breaches.
Potential Impact
The primary impact of CVE-2026-33164 is the potential for remote denial of service (application crashes) or remote code execution, which could allow attackers to take control of affected systems. Organizations that rely on libde265 for video decoding in media players, streaming platforms, video conferencing tools, or embedded devices such as smart TVs and IoT devices are at risk. Exploitation could lead to service disruption, unauthorized access, or compromise of sensitive data. Since the vulnerability requires no authentication or user interaction, attackers can exploit it by delivering specially crafted malicious video streams, increasing the attack surface. This poses a significant risk to enterprises handling large volumes of video content, content delivery networks, and service providers. The availability and integrity of video processing systems could be severely impacted, potentially affecting business continuity and user trust. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for patching, as attackers may develop exploits rapidly given the public disclosure.
Mitigation Recommendations
To mitigate CVE-2026-33164, organizations should immediately upgrade libde265 to version 1.0.17 or later, where the vulnerability has been patched. For environments where immediate upgrading is not feasible, applying strict input validation and sanitization on video streams before decoding can reduce risk. Network-level controls such as filtering or blocking untrusted or suspicious video streams may help limit exposure. Employing runtime protections like memory corruption mitigations (e.g., ASLR, DEP) can reduce exploitation success. Monitoring for unusual crashes or behavior in video processing applications can provide early detection of exploitation attempts. Vendors embedding libde265 in their products should release updated versions promptly and notify customers. Additionally, organizations should review their threat models to consider the risk posed by malicious media content and incorporate secure coding practices for handling multimedia data. Regular vulnerability scanning and patch management processes should be enforced to ensure timely remediation.
Affected Countries
United States, Germany, Japan, South Korea, China, United Kingdom, France, Canada, Australia, Netherlands
CVE-2026-33164: CWE-122: Heap-based Buffer Overflow in strukturag libde265
Description
libde265 is an open source implementation of the h.265 video codec. Prior to version 1.0.17, a malformed H.265 PPS NAL unit causes a segmentation fault in pic_parameter_set::set_derived_values(). This issue has been patched in version 1.0.17.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33164 is a heap-based buffer overflow vulnerability identified in the libde265 library, an open-source implementation of the H.265/HEVC video codec. The vulnerability arises when the library processes a malformed Picture Parameter Set (PPS) Network Abstraction Layer (NAL) unit. Specifically, the flaw is triggered in the pic_parameter_set::set_derived_values() function, which fails to properly validate or handle the malformed input, leading to a heap overflow and subsequent segmentation fault. This can cause the application using libde265 to crash or potentially allow an attacker to execute arbitrary code remotely. The vulnerability affects all versions of libde265 prior to 1.0.17, where the issue has been patched. The CVSS 4.0 base score is 8.7, reflecting a high severity due to the vulnerability's remote exploitability without any required privileges or user interaction, and its potential to cause high impact on availability and integrity. The vulnerability does not require authentication or user interaction, making it easier to exploit in scenarios where untrusted video streams are processed. Although no exploits have been reported in the wild yet, the nature of the flaw and the widespread use of libde265 in media players, streaming services, and embedded devices make it a significant security concern. The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow), a common and dangerous class of memory corruption bugs that can lead to serious security breaches.
Potential Impact
The primary impact of CVE-2026-33164 is the potential for remote denial of service (application crashes) or remote code execution, which could allow attackers to take control of affected systems. Organizations that rely on libde265 for video decoding in media players, streaming platforms, video conferencing tools, or embedded devices such as smart TVs and IoT devices are at risk. Exploitation could lead to service disruption, unauthorized access, or compromise of sensitive data. Since the vulnerability requires no authentication or user interaction, attackers can exploit it by delivering specially crafted malicious video streams, increasing the attack surface. This poses a significant risk to enterprises handling large volumes of video content, content delivery networks, and service providers. The availability and integrity of video processing systems could be severely impacted, potentially affecting business continuity and user trust. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for patching, as attackers may develop exploits rapidly given the public disclosure.
Mitigation Recommendations
To mitigate CVE-2026-33164, organizations should immediately upgrade libde265 to version 1.0.17 or later, where the vulnerability has been patched. For environments where immediate upgrading is not feasible, applying strict input validation and sanitization on video streams before decoding can reduce risk. Network-level controls such as filtering or blocking untrusted or suspicious video streams may help limit exposure. Employing runtime protections like memory corruption mitigations (e.g., ASLR, DEP) can reduce exploitation success. Monitoring for unusual crashes or behavior in video processing applications can provide early detection of exploitation attempts. Vendors embedding libde265 in their products should release updated versions promptly and notify customers. Additionally, organizations should review their threat models to consider the risk posed by malicious media content and incorporate secure coding practices for handling multimedia data. Regular vulnerability scanning and patch management processes should be enforced to ensure timely remediation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T21:17:08.887Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bdb3ffe32a4fbe5fced8ed
Added to database: 3/20/2026, 8:54:23 PM
Last enriched: 3/20/2026, 9:08:39 PM
Last updated: 3/21/2026, 1:49:28 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.