GStreamer Vulnerability Enables Remote DoS Attacks
Summary
CERT-Bund has issued security advisory WID-SEC-2025-0885 alerting to a high-severity vulnerability (CVSS Base Score 8.8) in GStreamer multimedia framework versions prior to 1.26.1. A remote, anonymous attacker can exploit this vulnerability to conduct Denial of Service attacks against affected systems. Multiple Linux distributions and enterprise products are affected, including SUSE, Debian, Ubuntu, Oracle Linux, Red Hat Enterprise Linux, Fedora, and IBM App Connect Enterprise. Organizations using affected GStreamer installations should apply available patches and mitigations promptly.
“Ein entfernter, anonymer Angreifer kann eine Schwachstelle in GStreamer ausnutzen, um einen Denial of Service Angriff durchzuführen.”
Organizations running any of the affected Linux distributions or IBM App Connect Enterprise products should inventory their GStreamer installations and verify version numbers against the vulnerable thresholds. Given the CVSS 8.8 score and remote exploitability, internet-facing systems processing multimedia content carry the highest risk and should be prioritized for patching. Monitor vendor security channels for updated packages as they become available.
About this source
CERT-Bund is the German federal cybersecurity agency's incident response team, run by the BSI. Their advisory feed publishes vulnerability disclosures and active exploitation warnings for software in widespread enterprise use: VPN appliances, email servers, file transfer products, ERP systems, browsers, hypervisors. Around 280 advisories a month, each with a CVSS score, affected versions, and remediation guidance. The advisories are written in German but cover the same vulnerabilities that show up in CISA, NCSC-UK, and JPCERT bulletins, often hours earlier. Watch this if you patch enterprise software, run a SOC, or write detection rules. GovPing publishes each advisory with the affected vendor, CVSS score, and original CERT-Bund link.
What changed
CERT-Bund published security advisory WID-SEC-2025-0885 detailing a high-severity remote Denial of Service vulnerability in GStreamer multimedia framework. The vulnerability affects GStreamer versions prior to 1.26.1 and carries a CVSS Base Score of 8.8 (high) and Temporal Score of 7.7 (high). Multiple Linux distributions including SUSE, Debian, Ubuntu, Oracle Linux, Red Hat Enterprise Linux, and Fedora are listed as affected products, along with IBM App Connect Enterprise versions below specified thresholds. Organizations operating affected GStreamer installations should prioritize applying available patches and mitigations to prevent potential remote DoS attacks from anonymous threat actors.
Archived snapshot
Apr 24, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2025-0885] GStreamer: Schwachstelle ermöglicht Denial of Service CVSS Base Score 8.8 (hoch) CVSS Temporal Score 7.7 (hoch) Remoteangriff ja Datum 24.04.2025 Stand UPDATE 24.04.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
GStreamer ist ein Multimedia-Framework mit einer Plugin-basierten Architektur für eine Vielzahl von Plattformen.
Produkte
UPDATE 27.07.2025
- SUSE openSUSE
UPDATE 11.06.2025
- Debian Linux
UPDATE 05.06.2025
- Ubuntu Linux
IBM App Connect Enterprise
IBM App Connect Enterprise Container Operator <12.12.0
IBM App Connect Enterprise <13.0.3.1-r1
UPDATE 29.05.2025SUSE Linux
UPDATE 27.05.2025Oracle Linux
UPDATE 26.05.2025Red Hat Enterprise Linux
UPDATE 21.05.2025Fedora Linux
24.04.2025Open Source GStreamer <1.26.1
Angriff
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in GStreamer ausnutzen, um einen Denial of Service Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.