CVE-2026-30997
Published: 13 April 2026
Summary
CVE-2026-30997 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Ffmpeg Ffmpeg. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the out-of-bounds read vulnerability in FFmpeg's read_global_param() by applying vendor-provided patches or updates.
Implements memory protection mechanisms such as address space layout randomization and data execution prevention to mitigate the impact of out-of-bounds reads in FFmpeg.
Validates and sanitizes crafted AV1 inputs before processing by the vulnerable read_global_param() function in FFmpeg to prevent triggering the DoS condition.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated exploitation of the OOB read in FFmpeg AV1 decoder directly enables initial access via public-facing media services (T1190) and causes application DoS via crafted input (T1499.004).
NVD Description
An out-of-bounds read in the read_global_param() function (libavcodec/av1dec.c) of FFmpeg v8.0.1 allows attackers to cause a Denial of Service (DoS) via a crafted input.
Deeper analysisAI
CVE-2026-30997 is an out-of-bounds read vulnerability in the read_global_param() function within libavcodec/av1dec.c of FFmpeg version 8.0.1. This issue, mapped to CWE-125, enables attackers to induce a Denial of Service (DoS) condition by processing a crafted input, as published on 2026-04-13 with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
The vulnerability can be exploited remotely by unauthenticated attackers with no privileges or user interaction required, due to its network vector and low complexity. By providing a maliciously crafted AV1 input to applications or services leveraging the affected FFmpeg component, attackers can trigger crashes or significant resource exhaustion, disrupting availability without impacting confidentiality or integrity.
Mitigation guidance and additional details are available in the referenced advisory at https://excellent-oatmeal-319.notion.site/CVE-2026-30997-Out-of-Bounds-Access-a7929817b9794568b2f7774397c7d65f and the FFmpeg GitHub repository at https://github.com/FFmpeg/FFmpeg.
Details
- CWE(s)