Description
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, iccDEV is vulnerable to NULL pointer dereference via the XML calculator parser. This issue has been patched in version 2.3.1.2.
Published: 2026-01-07
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

iccDEV incorporates a set of libraries and tools for handling ICC color management profiles. Prior to release 2.3.1.2 the XML calculator parser contains a null pointer dereference. When the parser is fed a crafted XML document the evaluated expression references a null pointer, causing a segmentation fault and terminating the process. This flaw results in a denial‑of‑service condition; it does not provide direct information disclosure nor modify data. The weakness aligns with common input validation and null pointer dereference vulnerabilities (CWE‑20, CWE‑476, CWE‑252, CWE‑690).

Affected Systems

All systems running InternationalColorConsortium iccDEV before version 2.3.1.2 are affected. The vulnerability applies to the library and any associated tools that invoke the XML calculator parser. System administrators should verify the installed version; any deployment of iccDEV older than 2.3.1.2 is in the risk zone.

Risk and Exploitability

The CVSS score of 5.5 indicates a moderate severity. EPSS is reported as less than 1%, suggesting that exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog. Attackers would likely supply a malicious XML document to the parser by embedding it in a corrupted or otherwise illicit file that the application processes. Because the flaw manifests only when the parser evaluates a certain expression, the exploitation requires that input be accepted by the application and parsed; this limits the attack to environments where iccDEV processes untrusted XML data.

Generated by OpenCVE AI on April 18, 2026 at 08:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update iccDEV to version 2.3.1.2 or later.
  • Restrict XML calculator parser usage to trusted input sources or disable it if not required.
  • Monitor system logs for crashes or abnormal termination and restart services as needed.

Generated by OpenCVE AI on April 18, 2026 at 08:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Color
Color iccdev
CPEs cpe:2.3:a:color:iccdev:*:*:*:*:*:*:*:*
Vendors & Products Color
Color iccdev

Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Internationalcolorconsortium
Internationalcolorconsortium iccdev
Vendors & Products Internationalcolorconsortium
Internationalcolorconsortium iccdev

Wed, 07 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 17:30:00 +0000

Type Values Removed Values Added
Description iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, iccDEV is vulnerable to NULL pointer dereference via the XML calculator parser. This issue has been patched in version 2.3.1.2.
Title NULL Pointer Dereference in iccDEV XML Calculator Parser
Weaknesses CWE-20
CWE-252
CWE-476
CWE-690
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Subscriptions

Color Iccdev
Internationalcolorconsortium Iccdev
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-07T18:20:17.575Z

Reserved: 2025-12-29T14:34:16.007Z

Link: CVE-2026-21498

cve-icon Vulnrichment

Updated: 2026-01-07T18:19:52.163Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-07T18:15:53.640

Modified: 2026-01-09T21:59:54.633

Link: CVE-2026-21498

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:15:15Z