CVE-2026-2245

3.3 LOW

📋 TL;DR

An out-of-bounds read vulnerability exists in CCExtractor's MPEG-TS file parser affecting versions up to 183. This allows local attackers to read memory beyond allocated buffers, potentially exposing sensitive information. Only users running CCExtractor on affected versions are impacted.

💻 Affected Systems

Products:
  • CCExtractor
Versions: All versions up to 183
Operating Systems: All platforms running CCExtractor
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where CCExtractor processes MPEG-TS files

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure of sensitive memory contents, potentially including credentials or other application data

🟠

Likely Case

Application crash or denial of service due to invalid memory access

🟢

If Mitigated

No impact if patched or proper access controls prevent local exploitation

🌐 Internet-Facing: LOW - Attack requires local access to the system
🏢 Internal Only: MEDIUM - Local users or processes could exploit this vulnerability

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access and ability to feed malicious MPEG-TS files to CCExtractor

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit fd7271bae238ccb3ae8a71304ea64f0886324925 and later

Vendor Advisory: https://github.com/CCExtractor/ccextractor/issues/2053

Restart Required: Yes

Instructions:

1. Update CCExtractor to version after commit fd7271bae238ccb3ae8a71304ea64f0886324925
2. Rebuild from source if using compiled version
3. Restart any CCExtractor processes

🔧 Temporary Workarounds

Restrict file processing

all

Limit CCExtractor to trusted MPEG-TS files only

Access control

linux

Restrict local user access to CCExtractor binary and input files

chmod 750 /path/to/ccextractor
chown root:trustedgroup /path/to/ccextractor

🧯 If You Can't Patch

  • Disable or remove CCExtractor from production systems
  • Implement strict file validation before passing to CCExtractor

🔍 How to Verify

Check if Vulnerable:

Check CCExtractor version with 'ccextractor --version' and verify if version is 183 or earlier

Check Version:

ccextractor --version

Verify Fix Applied:

Verify commit hash includes fd7271bae238ccb3ae8a71304ea64f0886324925 or version is newer than 183

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault errors
  • Memory access violation logs
  • Unexpected application crashes

Network Indicators:

  • None - local exploitation only

SIEM Query:

process.name:"ccextractor" AND (event.action:"segmentation_fault" OR event.action:"crash")

🔗 References

📤 Share & Export