Cyber Posture

CVE-2026-30997

HighPublic PoC

Published: 13 April 2026

Published
13 April 2026
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0005 16.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30997 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Ffmpeg Ffmpeg. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

preventrecover

Directly remediates the out-of-bounds read vulnerability in FFmpeg's read_global_param() by applying vendor-provided patches or updates.

prevent

Implements memory protection mechanisms such as address space layout randomization and data execution prevention to mitigate the impact of out-of-bounds reads in FFmpeg.

prevent

Validates and sanitizes crafted AV1 inputs before processing by the vulnerable read_global_param() function in FFmpeg to prevent triggering the DoS condition.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Remote unauthenticated exploitation of the OOB read in FFmpeg AV1 decoder directly enables initial access via public-facing media services (T1190) and causes application DoS via crafted input (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An out-of-bounds read in the read_global_param() function (libavcodec/av1dec.c) of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via a crafted input.

Deeper analysisAI

CVE-2026-30997 is an out-of-bounds read vulnerability in the read_global_param() function within libavcodec/av1dec.c of FFmpeg version 8.0.1. This issue, mapped to CWE-125, enables attackers to induce a Denial of Service (DoS) condition by processing a crafted input, as published on 2026-04-13 with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

The vulnerability can be exploited remotely by unauthenticated attackers with no privileges or user interaction required, due to its network vector and low complexity. By providing a maliciously crafted AV1 input to applications or services leveraging the affected FFmpeg component, attackers can trigger crashes or significant resource exhaustion, disrupting availability without impacting confidentiality or integrity.

Mitigation guidance and additional details are available in the referenced advisory at https://excellent-oatmeal-319.notion.site/CVE-2026-30997-Out-of-Bounds-Access-a7929817b9794568b2f7774397c7d65f and the FFmpeg GitHub repository at https://github.com/FFmpeg/FFmpeg.

Details

CWE(s)

Affected Products

ffmpeg
ffmpeg
≤ 8.0.1

CVEs Like This One

CVE-2026-30999Same product: Ffmpeg Ffmpeg
CVE-2026-30998Same product: Ffmpeg Ffmpeg
CVE-2025-1594Same product: Ffmpeg Ffmpeg
CVE-2023-6605Same product: Ffmpeg Ffmpeg
CVE-2026-40962Same product: Ffmpeg Ffmpeg
CVE-2024-35365Same product: Ffmpeg Ffmpeg
CVE-2026-3622Shared CWE-125
CVE-2026-32319Shared CWE-125
CVE-2026-41604Shared CWE-125
CVE-2026-32877Shared CWE-125

References