{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-8124","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-05-07T17:07:46.851Z","datePublished":"2026-05-08T01:15:10.347Z","dateUpdated":"2026-05-08T11:41:38.846Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-05-08T01:15:10.347Z"},"title":"GPAC box_code_base.c sidx_box_read allocation of resources","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-770","lang":"en","description":"Allocation of Resources"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-400","lang":"en","description":"Resource Consumption"}]}],"affected":[{"vendor":"n/a","product":"GPAC","versions":[{"version":"26.02","status":"affected"}],"cpes":["cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in GPAC up to 26.02.0. This affects the function sidx_box_read of the file src/isomedia/box_code_base.c. The manipulation leads to allocation of resources. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The identifier of the patch is 442e2299530138d8f874fd885c565ba98a6318ba. It is suggested to install a patch to address this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.7,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2026-05-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-05-07T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-05-07T19:13:04.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Lucian-2333 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/361914","name":"VDB-361914 | GPAC box_code_base.c sidx_box_read allocation of resources","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/361914/cti","name":"VDB-361914 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/808611","name":"Submit #808611 | gpac latest Denial of Service (DoS)","tags":["third-party-advisory"]},{"url":"https://github.com/gpac/gpac/issues/3519","tags":["exploit","issue-tracking"]},{"url":"https://github.com/gpac/gpac/commit/442e2299530138d8f874fd885c565ba98a6318ba","tags":["patch"]},{"url":"https://github.com/gpac/gpac/","tags":["product"]}],"tags":["x_open-source"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-08T11:41:30.349990Z","id":"CVE-2026-8124","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-08T11:41:38.846Z"}}]}}