CVE-2026-1415

3.3 LOW

📋 TL;DR

A null pointer dereference vulnerability exists in GPAC multimedia framework versions up to 2.4.0. Attackers with local access can crash the application by manipulating the Name argument in the gf_media_export_webvtt_metadata function. This affects systems running vulnerable GPAC versions for media processing.

💻 Affected Systems

Products:
  • GPAC Multimedia Framework
Versions: Up to and including version 2.4.0
Operating Systems: All platforms running GPAC
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration when processing WebVTT metadata.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Application crash leading to denial of service for media processing functionality, potentially disrupting workflows that depend on GPAC.

🟠

Likely Case

Local user causes application crash, interrupting media processing tasks but no privilege escalation or remote impact.

🟢

If Mitigated

Minimal impact with proper access controls limiting local user privileges and application isolation.

🌐 Internet-Facing: LOW - Attack requires local access, cannot be exploited remotely.
🏢 Internal Only: MEDIUM - Local attackers can cause denial of service, but no code execution or privilege escalation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access and specific manipulation of WebVTT metadata processing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after commit af951b892dfbaaa38336ba2eba6d6a42c25810fd

Vendor Advisory: https://github.com/gpac/gpac/issues/3428

Restart Required: Yes

Instructions:

1. Update GPAC to version after commit af951b892dfbaaa38336ba2eba6d6a42c25810fd
2. Rebuild from source if using custom builds
3. Restart any services using GPAC

🔧 Temporary Workarounds

Restrict local access

all

Limit local user access to systems running GPAC to prevent exploitation

Disable WebVTT processing

all

Avoid processing WebVTT metadata if not required

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor for application crashes and investigate unauthorized local access attempts

🔍 How to Verify

Check if Vulnerable:

Check GPAC version with 'gpac -version' or verify source code contains vulnerable function in src/media_tools/media_export.c

Check Version:

gpac -version 2>&1 | head -1

Verify Fix Applied:

Verify GPAC version is newer than 2.4.0 or contains commit af951b892dfbaaa38336ba2eba6d6a42c25810fd

📡 Detection & Monitoring

Log Indicators:

  • GPAC application crashes
  • Segmentation fault errors in system logs
  • Unexpected termination of media processing tasks

Network Indicators:

  • No network indicators - local exploit only

SIEM Query:

source="*syslog*" AND "gpac" AND ("segmentation fault" OR "crash" OR "SIGSEGV")

🔗 References

📤 Share & Export