Search for vulnerabilities
Vulnerability details: VCID-q2kd-rxdb-uke9
Vulnerability ID VCID-q2kd-rxdb-uke9
Aliases CVE-2023-6602
Summary A flaw was found in FFmpeg's TTY Demuxer. This vulnerability allows possible data exfiltration via improper parsing of non-TTY-compliant input files in HLS playlists.
Status Published
Exploitability 0.5
Weighted Severity 4.8
Risk 2.4
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00132 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00132 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00132 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00132 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00132 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00132 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00132 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00147 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00147 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00147 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00147 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00147 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00147 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00147 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00147 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00147 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00147 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00147 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00153 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.0016 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00199 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00199 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00199 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00199 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
epss 0.00199 https://api.first.org/data/v1/epss?cve=CVE-2023-6602
cvssv3.1 5.3 https://bugzilla.redhat.com/show_bug.cgi?id=2334338
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2334338
cvssv3.1 3.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2023-6602
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=2334338
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-31T15:00:28Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2334338
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-6602
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.33619
EPSS Score 0.00132
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:39:23.492694+00:00 Vulnrichment Import https://github.com/cisagov/vulnrichment/blob/develop/2023/6xxx/CVE-2023-6602.json 37.0.0