Changeflow GovPing Data Privacy & Cybersecurity GStreamer Vulnerability Enables Remote DoS Attacks
Priority review Notice Added Final

GStreamer Vulnerability Enables Remote DoS Attacks

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund has issued security advisory WID-SEC-2025-0885 alerting to a high-severity vulnerability (CVSS Base Score 8.8) in GStreamer multimedia framework versions prior to 1.26.1. A remote, anonymous attacker can exploit this vulnerability to conduct Denial of Service attacks against affected systems. Multiple Linux distributions and enterprise products are affected, including SUSE, Debian, Ubuntu, Oracle Linux, Red Hat Enterprise Linux, Fedora, and IBM App Connect Enterprise. Organizations using affected GStreamer installations should apply available patches and mitigations promptly.

“Ein entfernter, anonymer Angreifer kann eine Schwachstelle in GStreamer ausnutzen, um einen Denial of Service Angriff durchzuführen.”

Why this matters

Organizations running any of the affected Linux distributions or IBM App Connect Enterprise products should inventory their GStreamer installations and verify version numbers against the vulnerable thresholds. Given the CVSS 8.8 score and remote exploitability, internet-facing systems processing multimedia content carry the highest risk and should be prioritized for patching. Monitor vendor security channels for updated packages as they become available.

AI-drafted from the source document, validated against GovPing's analyst note standards . For the primary regulatory language, read the source document .
Published by CERT-Bund on wid.cert-bund.de . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

CERT-Bund is the German federal cybersecurity agency's incident response team, run by the BSI. Their advisory feed publishes vulnerability disclosures and active exploitation warnings for software in widespread enterprise use: VPN appliances, email servers, file transfer products, ERP systems, browsers, hypervisors. Around 280 advisories a month, each with a CVSS score, affected versions, and remediation guidance. The advisories are written in German but cover the same vulnerabilities that show up in CISA, NCSC-UK, and JPCERT bulletins, often hours earlier. Watch this if you patch enterprise software, run a SOC, or write detection rules. GovPing publishes each advisory with the affected vendor, CVSS score, and original CERT-Bund link.

What changed

CERT-Bund published security advisory WID-SEC-2025-0885 detailing a high-severity remote Denial of Service vulnerability in GStreamer multimedia framework. The vulnerability affects GStreamer versions prior to 1.26.1 and carries a CVSS Base Score of 8.8 (high) and Temporal Score of 7.7 (high). Multiple Linux distributions including SUSE, Debian, Ubuntu, Oracle Linux, Red Hat Enterprise Linux, and Fedora are listed as affected products, along with IBM App Connect Enterprise versions below specified thresholds. Organizations operating affected GStreamer installations should prioritize applying available patches and mitigations to prevent potential remote DoS attacks from anonymous threat actors.

Archived snapshot

Apr 24, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2025-0885] GStreamer: Schwachstelle ermöglicht Denial of Service CVSS Base Score 8.8 (hoch) CVSS Temporal Score 7.7 (hoch) Remoteangriff ja Datum 24.04.2025 Stand UPDATE 24.04.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

GStreamer ist ein Multimedia-Framework mit einer Plugin-basierten Architektur für eine Vielzahl von Plattformen.

Produkte

UPDATE 27.07.2025
- SUSE openSUSE
UPDATE 11.06.2025
- Debian Linux
UPDATE 05.06.2025
- Ubuntu Linux

  • IBM App Connect Enterprise

  • IBM App Connect Enterprise Container Operator <12.12.0

  • IBM App Connect Enterprise <13.0.3.1-r1
    UPDATE 29.05.2025

  • SUSE Linux
    UPDATE 27.05.2025

  • Oracle Linux
    UPDATE 26.05.2025

  • Red Hat Enterprise Linux
    UPDATE 21.05.2025

  • Fedora Linux
    24.04.2025

  • Open Source GStreamer <1.26.1

Angriff

Angriff

Ein entfernter, anonymer Angreifer kann eine Schwachstelle in GStreamer ausnutzen, um einen Denial of Service Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
April 24th, 2025
Instrument
Notice
Branch
Executive
Source language
de
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies Manufacturers
Industry sector
5112 Software & Technology
Activity scope
Vulnerability disclosure Security advisory
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Software & Technology

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!