Problematic Vulnerability in MOV Parser of FFmpeg
CVE-2025-1373

4.8MEDIUM

Key Information:

Vendor

FFmpeg

Status
Vendor
CVE Published:
17 February 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-1373?

A vulnerability has been discovered in FFmpeg's MOV Parser component, specifically within the function mov_read_trak located in libavformat/mov.c. The issue arises from a null pointer dereference, which can potentially allow malicious actors to exploit the application. This vulnerability necessitates local access to the system for successful exploitation. It has been publicly disclosed and can be leveraged if not addressed. Users are strongly advised to apply the recommended patch identified in commit 43be8d07281caca2e88bfd8ee2333633e1fb1a13 to mitigate the risk.

Affected Version(s)

FFmpeg 7.0

FFmpeg 7.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
4.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

0x20z (VulDB User)
.