Description
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. A vulnerability present in versions prior to 2.3.1.2 affects users of the iccDEV library who process ICC color profiles. It results in heap buffer overflow in `CIccTagLut16::Validate()`. Version 2.3.1.2 contains a patch. No known workarounds are available.
Published: 2026-01-06
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Heap Buffer Overflow
Action: Patch
AI Analysis

Impact

The vulnerability is a heap buffer overflow in the iccDEV library’s CIccTagLut16::Validate() function when processing ICC color profiles. A malformed profile can corrupt heap memory, potentially allowing an attacker to execute arbitrary code or cause an application crash. The CVE description explicitly notes that the flaw is triggered during profile validation, indicating that malicious files serve as the primary exploitation vector.

Affected Systems

All installations of the International Color Consortium’s iccDEV library built before release 2.3.1.2 are affected. Applications that depend on iccDEV for handling ICC profiles—such as image editing software, graphics libraries, and digital asset management systems—must be reviewed, as they could load untrusted profiles from external sources.

Risk and Exploitability

The CVSS score of 6.1 classifies the issue as medium severity. EPSS < 1% indicates a very low but nonzero chance of real‑world exploitation, and the vulnerability is not listed in CISA’s KEV catalog, meaning no widespread, known exploits exist yet. Based on the typical use of ICC profiles, the likely attack path involves an attacker delivering a malicious or corrupted ICC file into an application that uses iccDEV, causing the allocator to overflow during validation. This could undermine the confidentiality, integrity, or availability of the host, depending on how the memory corruption is leveraged.

Generated by OpenCVE AI on April 18, 2026 at 20:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official library patch to release 2.3.1.2 or newer, ensuring that any binaries linking to iccDEV use the updated version.
  • Update any dependent applications or libraries so they reference the patched iccDEV binary.
  • Configure applications to only load ICC profiles from trusted sources or disable automatic profile loading where feasible, reducing the window for exploitation.

Generated by OpenCVE AI on April 18, 2026 at 20:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 12 Jan 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Color
Color iccdev
CPEs cpe:2.3:a:color:iccdev:*:*:*:*:*:*:*:*
Vendors & Products Color
Color iccdev

Wed, 07 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Internationalcolorconsortium
Internationalcolorconsortium iccdev
Vendors & Products Internationalcolorconsortium
Internationalcolorconsortium iccdev

Tue, 06 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 06 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Description iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. A vulnerability present in versions prior to 2.3.1.2 affects users of the iccDEV library who process ICC color profiles. It results in heap buffer overflow in `CIccTagLut16::Validate()`. Version 2.3.1.2 contains a patch. No known workarounds are available.
Title iccDEV has heap buffer overflow in CIccTagLut16::Validate()
Weaknesses CWE-122
CWE-125
CWE-193
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H'}


Subscriptions

Color Iccdev
Internationalcolorconsortium Iccdev
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-06T19:59:15.605Z

Reserved: 2025-12-29T14:34:16.006Z

Link: CVE-2026-21490

cve-icon Vulnrichment

Updated: 2026-01-06T19:59:09.796Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-06T19:16:08.177

Modified: 2026-01-12T18:28:28.913

Link: CVE-2026-21490

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T20:15:09Z

Weaknesses