Cyber Posture

CVE-2023-6605

High

Published: 06 January 2025

Published
06 January 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Score 0.0009 25.8th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2023-6605 is a high-severity Resource Injection (CWE-99) vulnerability in Ffmpeg Ffmpeg. Its CVSS base score is 7.2 (High).

Operationally, ranked at the 25.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the specific flaw in FFmpeg's DASH playlist support by applying vendor patches for CVE-2023-6605.

prevent

Validates information inputs such as DASH playlists to block malicious URLs that trigger arbitrary HTTP GET requests.

preventdetect

Monitors and controls outbound network communications at system boundaries to restrict unauthorized HTTP requests issued by FFmpeg.

NVD Description

A flaw was found in FFmpeg's DASH playlist support. This vulnerability allows arbitrary HTTP GET requests to be made on behalf of the machine running FFmpeg via a crafted DASH playlist containing malicious URLs.

Deeper analysisAI

CVE-2023-6605 is a vulnerability in FFmpeg's DASH playlist support that enables arbitrary HTTP GET requests to be issued on behalf of the machine running FFmpeg. This flaw is triggered by processing a crafted DASH playlist containing malicious URLs. The affected software is FFmpeg, with a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N) and is associated with CWE-99.

Remote unauthenticated attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. By supplying a malicious DASH playlist to an FFmpeg instance, attackers cause it to perform HTTP GET requests to attacker-specified URLs, potentially enabling server-side request forgery scenarios that impact confidentiality and integrity with a changed scope.

Advisories detailing patches and mitigations are available from Red Hat Bugzilla at https://bugzilla.redhat.com/show_bug.cgi?id=2334336 and the Debian LTS announcement at https://lists.debian.org/debian-lts-announce/2025/07/msg00004.html.

Details

CWE(s)

Affected Products

ffmpeg
ffmpeg
2.0 — 6.0

CVEs Like This One

CVE-2024-35365Same product: Ffmpeg Ffmpeg
CVE-2025-1594Same product: Ffmpeg Ffmpeg
CVE-2026-30999Same product: Ffmpeg Ffmpeg
CVE-2026-30997Same product: Ffmpeg Ffmpeg
CVE-2026-30998Same product: Ffmpeg Ffmpeg
CVE-2026-40962Same product: Ffmpeg Ffmpeg
CVE-2026-3693Shared CWE-99
CVE-2024-57971Shared CWE-99
CVE-2025-1642Shared CWE-99
CVE-2024-5706Shared CWE-99

References