Description
An issue in Assimp v.6.0.2 allows a remote attacker to cause a denial of service via the FBXConverter.cpp and ConvertMeshMultiMaterial() method
Published: 2026-05-04
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw resides in Assimp version 6.0.2 inside the ConvertMeshMultiMaterial routine of FBXConverter.cpp. When the library parses the body of an FBX file, it allocates memory without adequate bounds checks, which can be abused to oversize buffers or trigger out-of-range writes. The result is an immediate crash of the host application, leading to a loss of service. This issue is identified by the weaknesses captured in CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Memory Allocation).

Affected Systems

Any software that bundles the Assimp library version 6.0.2 or earlier and processes FBX 3‑D model files is affected. The vulnerability is confined to this specific library release; upgrading to the latest Assimp version that removes or alters the vulnerable code path removes the problem.

Risk and Exploitability

An attacker can trigger the crash by delivering a specially crafted FBX file, either through an upload endpoint, network transfer, or by persuading a user to open the file locally. Based on the description, the attack vector is inferred to involve the normal parsing of a malformed or unexpected FBX sequence; the file need not contain a specific structure, but an abnormal sequence can trigger the failure. The CVSS score of 7.5 indicates a high severity, while the EPSS score is not available, leaving the precise likelihood of exploitation uncertain. The vulnerability is not listed in the CISA KEV catalog, but its potential to bring down services where Assimp is in use warrants prompt mitigation.

Generated by OpenCVE AI on May 4, 2026 at 21:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Assimp library to the latest released version, which removes the vulnerable ConvertMeshMultiMaterial routine.
  • Restrict the size and complexity of any FBX file before handing it to the library; validate expected structure and deny files that exceed reasonable limits.
  • Run applications that process untrusted FBX content in a sandboxed or resource‑limited environment to contain any resulting crash and prevent broader system impact.

Generated by OpenCVE AI on May 4, 2026 at 21:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 00:15:00 +0000

Type Values Removed Values Added
Title Assimp 6.0.2 Denial-of-Service via FBXConverter Parsing Assimp: Assimp: Denial of Service via FBXConverter.cpp and ConvertMeshMultiMaterial() method
Weaknesses CWE-1284
References
Metrics threat_severity

None

threat_severity

Important


Mon, 04 May 2026 22:15:00 +0000

Type Values Removed Values Added
Title Assimp 6.0.2 Denial-of-Service via FBXConverter Parsing

Mon, 04 May 2026 20:45:00 +0000

Type Values Removed Values Added
Title Denial of Service via FBX Conversion in Assimp 6.0.2
Weaknesses CWE-395

Mon, 04 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 18:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400
CWE-770
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Mon, 04 May 2026 16:15:00 +0000

Type Values Removed Values Added
Title Denial of Service via FBX Conversion in Assimp 6.0.2
Weaknesses CWE-395

Mon, 04 May 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Assimp
Assimp assimp
Vendors & Products Assimp
Assimp assimp

Mon, 04 May 2026 14:15:00 +0000

Type Values Removed Values Added
Description An issue in Assimp v.6.0.2 allows a remote attacker to cause a denial of service via the FBXConverter.cpp and ConvertMeshMultiMaterial() method
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-04T17:50:25.141Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-70069

cve-icon Vulnrichment

Updated: 2026-05-04T17:17:14.769Z

cve-icon NVD

Status : Received

Published: 2026-05-04T14:16:29.473

Modified: 2026-05-04T18:16:25.697

Link: CVE-2025-70069

cve-icon Redhat

Severity : Important

Publid Date: 2026-05-04T00:00:00Z

Links: CVE-2025-70069 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T22:00:11Z

Weaknesses