Description
Buffer Overflow vulnerability exists in Assimp versions up to 6.0.2 in the FBX Importer. The vulnerability occurs in aiMaterial::AddBinaryProperty, where a property key string from a crafted FBX file is copied into a fixed-size heap buffer using strcpy() without runtime length validation
Published: 2026-05-04
Score: 5.6 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A buffer overflow exists in the Assimp library’s FBX Importer in the aiMaterial::AddBinaryProperty function where a property key string from a crafted FBX file is copied into a fixed‑size heap buffer by strcpy() without runtime length validation. This unchecked copy can corrupt memory on the heap; while the CVE data does not state the exact consequence, it is strongly implied that such an overflow could lead to arbitrary code execution or memory corruption. The description explicitly identifies the flaw, but the ultimate impact is not directly stated.

Affected Systems

All releases of Assimp up to and including 6.0.2 are affected. Any application that links to these versions and processes FBX files is potentially vulnerable.

Risk and Exploitability

The absence of CVSS and EPSS metrics means the severity must be inferred from the nature of a heap buffer overflow, which is typically high. The flaw can be triggered when an application imports an attacker‑crafted FBX file; the attack vector is therefore through untrusted file content, and an attacker would need the target to load the malicious file. The vulnerability is not listed in the CISA KEV catalog, but its exploitation risk is significant enough to warrant attention.

Generated by OpenCVE AI on May 4, 2026 at 16:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check if a newer Assimp release (post‑6.0.2) is available that fixes the overflow and upgrade if possible; this is an inferred best practice as the CVE description does not provide an official patch.
  • Implement input validation for FBX property key strings in the consuming application, ensuring they are not longer than the buffer size before calling aiMaterial::AddBinaryProperty; this mitigates the overflow but is an inferred mitigation.
  • Compile the application with compiler stack‑protection options such as -fstack-protector or enable address‑space layout randomization to reduce the impact of an overflow if the bug is not yet fixed.

Generated by OpenCVE AI on May 4, 2026 at 16:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 00:15:00 +0000

Type Values Removed Values Added
Title Heap Buffer Overflow in Assimp FBX Importer aiMaterial::AddBinaryProperty Assimp: Assimp: Buffer overflow in FBX Importer allows arbitrary code execution via crafted file.
Weaknesses CWE-120
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L'}

threat_severity

Moderate


Mon, 04 May 2026 16:45:00 +0000

Type Values Removed Values Added
Title Heap Buffer Overflow in Assimp FBX Importer aiMaterial::AddBinaryProperty
Weaknesses CWE-122
CWE-20

Mon, 04 May 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Assimp
Assimp assimp
Vendors & Products Assimp
Assimp assimp

Mon, 04 May 2026 14:15:00 +0000

Type Values Removed Values Added
Description Buffer Overflow vulnerability exists in Assimp versions up to 6.0.2 in the FBX Importer. The vulnerability occurs in aiMaterial::AddBinaryProperty, where a property key string from a crafted FBX file is copied into a fixed-size heap buffer using strcpy() without runtime length validation
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-04T14:06:39.952Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-70067

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-04T14:16:29.350

Modified: 2026-05-04T14:16:29.350

Link: CVE-2025-70067

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-04T00:00:00Z

Links: CVE-2025-70067 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T16:30:03Z

Weaknesses