Description
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, iccDEV is vulnerable to heap-buffer-overflow vulnerability in IccTagXml(). This issue has been patched in version 2.3.1.2.
Published: 2026-01-07
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Memory Corruption – Potential Code Execution
Action: Immediate Patch
AI Analysis

Impact

A heap-buffer-overflow vulnerability exists in the IccTagXml() function of the iccDEV library, allowing an attacker to supply a crafted ICC profile that overflows an internal buffer during XML tag processing. The overflow can corrupt heap memory, potentially enabling arbitrary code execution or causing the target process to crash, which undermines confidentiality, integrity, or availability of the affected application. The weakness is classified under several CWE identifiers, including buffer over-read and out-of-bounds writes.

Affected Systems

International Color Consortium’s iccDEV, a set of libraries and tools for handling ICC color profiles. Versions prior to 2.3.1.2 are affected, with the fix released in that version, as noted by the vendor; no other vendors or product variants are listed as affected.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity, while the EPSS score of less than 1% suggests a very low current exploitation probability. The vulnerability is not present in the CISA Known Exploited Vulnerabilities catalog, implying no publicly documented attacks yet. Exploitation would likely require the attacker to supply a malicious ICC profile to an application linking iccDEV, which may be achievable via compromised user files or injected profiles in remote services. Given the heap nature of the flaw and the absence of documented exploits, the immediate risk is moderate, but the potential for arbitrarily executing code warrants prompt remediation.

Generated by OpenCVE AI on April 18, 2026 at 16:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade iccDEV to version 2.3.1.2 or later, ensuring the compiled libraries and tools are replaced with the patched release.
  • Monitor the system for abnormal crashes or logs indicating memory corruption, and apply containment measures such as restricting profile loading until patching is complete.
  • Restrict or disable loading of ICC profiles from untrusted sources in applications until the patch is applied.

Generated by OpenCVE AI on April 18, 2026 at 16:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 13 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Color
Color iccdev
CPEs cpe:2.3:a:color:iccdev:*:*:*:*:*:*:*:*
Vendors & Products Color
Color iccdev

Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Internationalcolorconsortium
Internationalcolorconsortium iccdev
Vendors & Products Internationalcolorconsortium
Internationalcolorconsortium iccdev

Wed, 07 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 17:30:00 +0000

Type Values Removed Values Added
Description iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, iccDEV is vulnerable to heap-buffer-overflow vulnerability in IccTagXml(). This issue has been patched in version 2.3.1.2.
Title iccDEV has heap-buffer-overflow vulnerability on IccTagXml()
Weaknesses CWE-122
CWE-125
CWE-20
CWE-787
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Color Iccdev
Internationalcolorconsortium Iccdev
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-07T19:27:44.869Z

Reserved: 2026-01-02T18:45:27.395Z

Link: CVE-2026-21678

cve-icon Vulnrichment

Updated: 2026-01-07T18:28:03.139Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-07T18:15:55.000

Modified: 2026-01-13T21:00:35.353

Link: CVE-2026-21678

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:00:05Z