Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33164: CWE-122: Heap-based Buffer Overflow in strukturag libde265

0
High
VulnerabilityCVE-2026-33164cvecve-2026-33164cwe-122
Published: Fri Mar 20 2026 (03/20/2026, 20:33:04 UTC)
Source: CVE Database V5
Vendor/Project: strukturag
Product: libde265

Description

libde265 is an open source implementation of the h.265 video codec. Prior to version 1.0.17, a malformed H.265 PPS NAL unit causes a segmentation fault in pic_parameter_set::set_derived_values(). This issue has been patched in version 1.0.17.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 21:08:39 UTC

Technical Analysis

CVE-2026-33164 is a heap-based buffer overflow vulnerability identified in the libde265 library, an open-source implementation of the H.265/HEVC video codec. The vulnerability arises when the library processes a malformed Picture Parameter Set (PPS) Network Abstraction Layer (NAL) unit. Specifically, the flaw is triggered in the pic_parameter_set::set_derived_values() function, which fails to properly validate or handle the malformed input, leading to a heap overflow and subsequent segmentation fault. This can cause the application using libde265 to crash or potentially allow an attacker to execute arbitrary code remotely. The vulnerability affects all versions of libde265 prior to 1.0.17, where the issue has been patched. The CVSS 4.0 base score is 8.7, reflecting a high severity due to the vulnerability's remote exploitability without any required privileges or user interaction, and its potential to cause high impact on availability and integrity. The vulnerability does not require authentication or user interaction, making it easier to exploit in scenarios where untrusted video streams are processed. Although no exploits have been reported in the wild yet, the nature of the flaw and the widespread use of libde265 in media players, streaming services, and embedded devices make it a significant security concern. The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow), a common and dangerous class of memory corruption bugs that can lead to serious security breaches.

Potential Impact

The primary impact of CVE-2026-33164 is the potential for remote denial of service (application crashes) or remote code execution, which could allow attackers to take control of affected systems. Organizations that rely on libde265 for video decoding in media players, streaming platforms, video conferencing tools, or embedded devices such as smart TVs and IoT devices are at risk. Exploitation could lead to service disruption, unauthorized access, or compromise of sensitive data. Since the vulnerability requires no authentication or user interaction, attackers can exploit it by delivering specially crafted malicious video streams, increasing the attack surface. This poses a significant risk to enterprises handling large volumes of video content, content delivery networks, and service providers. The availability and integrity of video processing systems could be severely impacted, potentially affecting business continuity and user trust. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for patching, as attackers may develop exploits rapidly given the public disclosure.

Mitigation Recommendations

To mitigate CVE-2026-33164, organizations should immediately upgrade libde265 to version 1.0.17 or later, where the vulnerability has been patched. For environments where immediate upgrading is not feasible, applying strict input validation and sanitization on video streams before decoding can reduce risk. Network-level controls such as filtering or blocking untrusted or suspicious video streams may help limit exposure. Employing runtime protections like memory corruption mitigations (e.g., ASLR, DEP) can reduce exploitation success. Monitoring for unusual crashes or behavior in video processing applications can provide early detection of exploitation attempts. Vendors embedding libde265 in their products should release updated versions promptly and notify customers. Additionally, organizations should review their threat models to consider the risk posed by malicious media content and incorporate secure coding practices for handling multimedia data. Regular vulnerability scanning and patch management processes should be enforced to ensure timely remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T21:17:08.887Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bdb3ffe32a4fbe5fced8ed

Added to database: 3/20/2026, 8:54:23 PM

Last enriched: 3/20/2026, 9:08:39 PM

Last updated: 3/21/2026, 1:49:28 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses