Description
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, iccDEV is vulnerable to division by zero in the TIFF Image Reader. This issue has been patched in version 2.3.1.2.
Published: 2026-01-07
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

A flaw in iccDEV’s TIFF image reader causes a division by zero when parsing certain TIFF files, which can crash the host process. The crash results in a denial of service for any application that relies on the library. The vulnerability falls under CWE-20 (Improper Input Validation) and CWE-369 (Divide by Zero).

Affected Systems

International Color Consortium’s iccDEV library, versions prior to 2.3.1.2, is affected. Any system that uses a vulnerable iteration of iccDEV and processes TIFF images is at risk.

Risk and Exploitability

The CVSS score of 5.5 indicates medium severity, while the EPSS score of less than 1% shows a very low likelihood of exploitation in the near term. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local: a malicious TIFF file can be supplied by any user or application that loads the library, triggering a crash without requiring network access or special privileges.

Generated by OpenCVE AI on April 18, 2026 at 16:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade iccDEV to version 2.3.1.2 or later, which contains the patch for the division by zero issue.
  • Audit all deployments to ensure that no older iccDEV versions are present, particularly on services that handle user‑supplied image data.
  • Where upgrading is not immediately possible, restrict the processing of TIFF files in critical applications or isolate the vulnerable library in a sandboxed environment to contain potential crashes.

Generated by OpenCVE AI on April 18, 2026 at 16:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Color
Color iccdev
CPEs cpe:2.3:a:color:iccdev:*:*:*:*:*:*:*:*
Vendors & Products Color
Color iccdev

Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Internationalcolorconsortium
Internationalcolorconsortium iccdev
Vendors & Products Internationalcolorconsortium
Internationalcolorconsortium iccdev

Wed, 07 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 17:30:00 +0000

Type Values Removed Values Added
Description iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, iccDEV is vulnerable to division by zero in the TIFF Image Reader. This issue has been patched in version 2.3.1.2.
Title Division by Zero in iccDEV TIFF Image Reader
Weaknesses CWE-20
CWE-369
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Subscriptions

Color Iccdev
Internationalcolorconsortium Iccdev
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-07T18:19:11.012Z

Reserved: 2025-12-29T14:34:16.006Z

Link: CVE-2026-21495

cve-icon Vulnrichment

Updated: 2026-01-07T18:19:05.247Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-07T18:15:53.127

Modified: 2026-01-09T21:56:36.660

Link: CVE-2026-21495

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:00:05Z

Weaknesses