CVE-2025-22919

6.5 MEDIUM

📋 TL;DR

This CVE describes a reachable assertion vulnerability in FFmpeg that allows attackers to cause a Denial of Service (DoS) by opening a specially crafted AAC audio file. The vulnerability affects systems running vulnerable versions of FFmpeg that process untrusted AAC files. Users and applications that process AAC files from untrusted sources are at risk.

💻 Affected Systems

Products:
  • FFmpeg
Versions: git-master commit N-113007-g8d24a28d06 and potentially earlier versions (exact range not specified in references)
Operating Systems: All operating systems running vulnerable FFmpeg versions
Default Config Vulnerable: ⚠️ Yes
Notes: Any FFmpeg installation that processes AAC files is vulnerable. The vulnerability is in the AAC decoder component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of FFmpeg-based applications, potentially affecting media processing pipelines, streaming services, or video editing software that crashes when processing malicious AAC files.

🟠

Likely Case

Application crash or hang when processing malicious AAC files, leading to temporary service disruption until the process is restarted.

🟢

If Mitigated

No impact if proper input validation and sandboxing are implemented, or if AAC files are only processed from trusted sources.

🌐 Internet-Facing: MEDIUM - Applications that accept AAC file uploads from users or process AAC streams from untrusted sources could be targeted for DoS attacks.
🏢 Internal Only: LOW - Internal systems that only process AAC files from trusted sources have minimal risk, though accidental processing of malicious files could still cause disruption.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Attackers only need to provide a crafted AAC file to trigger the assertion.

Exploitation requires the victim to process the malicious AAC file. No authentication or special privileges are needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in FFmpeg git repository after commit N-113007-g8d24a28d06

Vendor Advisory: https://trac.ffmpeg.org/ticket/11385

Restart Required: Yes

Instructions:

1. Update FFmpeg to the latest version from the official git repository. 2. Rebuild and reinstall FFmpeg if compiled from source. 3. Restart any services or applications using FFmpeg.

🔧 Temporary Workarounds

Disable AAC file processing

all

Configure applications to reject or skip AAC file processing if not required.

# Application-specific configuration required

Input validation and sandboxing

linux

Implement strict input validation for AAC files and run FFmpeg in a sandboxed environment.

# Use containerization or sandboxing tools like Docker, Firejail, or SELinux

🧯 If You Can't Patch

  • Implement network segmentation to isolate FFmpeg processing systems from untrusted networks.
  • Deploy application-level firewalls or WAFs to block malicious AAC file uploads.

🔍 How to Verify

Check if Vulnerable:

Check FFmpeg version and commit hash. If using git-master around commit N-113007-g8d24a28d06, the system is likely vulnerable.

Check Version:

ffmpeg -version | grep 'version\|commit'

Verify Fix Applied:

Update FFmpeg and test with the malicious AAC file from the vulnerability report (if available) to ensure no crash occurs.

📡 Detection & Monitoring

Log Indicators:

  • FFmpeg process crashes with assertion failure messages
  • Application logs showing unexpected termination during AAC file processing

Network Indicators:

  • Unusual volume of AAC file uploads to media processing endpoints
  • Pattern of AAC file uploads followed by service restarts

SIEM Query:

source="application.logs" AND ("ffmpeg" OR "aac") AND ("crash" OR "assertion" OR "segfault")

🔗 References

📤 Share & Export