CVE-2023-6605
Ffmpeg vulnerability analysis and mitigation

Overview

CVE-2023-6605 is a vulnerability discovered in FFmpeg's DASH (Dynamic Adaptive Streaming over HTTP) playlist support. The vulnerability was disclosed on January 6, 2025, affecting FFmpeg versions 4.2 through 6.0 when compiled with libxml2 support (NVD, RedHat Bugzilla).

Technical details

The vulnerability stems from the DASH demuxer's failure to check the protocol whitelist before triggering the HTTP demuxer. This behavior results in the whitelist being updated to include multiple protocols including http, https, tls, rtp, tcp, udp, crypto, httpproxy, and data. The vulnerability has been assigned a CVSS v3.1 base score of 7.2 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N (NVD).

Impact

When exploited, this vulnerability allows an attacker to make arbitrary HTTP GET requests on behalf of the machine running FFmpeg. Since the responses to these HTTP requests are treated as input to FFmpeg, an attacker can construct a DASH playlist that first requests content from an attacker-controlled web server, potentially leading to data exfiltration (RedHat Bugzilla).

Mitigation and workarounds

The recommended mitigation is to restrict DASH playlist URIs to only data:// and file:// protocols unless otherwise specified with protocolwhitelist. Organizations should also consider implementing strict input validation and controlling which protocols are allowed in their FFmpeg deployments ([RedHat Bugzilla](https://bugzilla.redhat.com/showbug.cgi?id=2334336)).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management