Description
iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `CIccTagXmlTagData::ToXml()`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.
Published: 2026-01-07
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Untrusted Input Exploitation
Action: Patch ASAP
AI Analysis

Impact

iccDEV is a library that handles ICC color profiles. In releases before 2.3.1.2, the CIccTagXmlTagData::ToXml() function has a type‑confusion flaw that can be triggered by supplying a crafted XML tag inside a profile. The incorrect handling of data types may lead to memory corruption, corrupted profile data, or other unintended behavior. The description of the vulnerability does not indicate that code execution is possible, only that the library misinterprets input data.

Affected Systems

All versions of the International Color Consortium’s iccDEV library older than 2.3.1.2 that are used to read or process ICC color profiles are affected. Applications, services, or third‑party components that embed or link against the vulnerable library are at risk when they import data from untrusted profiles.

Risk and Exploitability

The CVSS score of 6.3 reflects moderate severity, while the EPSS score of less than 1% indicates that exploitation attempts are expected to be rare. It is not listed in the CISA KEV catalog. The likely attack vector is file‑based: an attacker supplies a malicious ICC profile that is processed by the vulnerable library. If the profile is interpreted in a privileged or sensitive context, untrusted data could corrupt application state or compromise data integrity.

Generated by OpenCVE AI on April 18, 2026 at 16:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the iccDEV library to version 2.3.1.2 or later as soon as possible.
  • Rebuild or recompile any applications that link to iccDEV to incorporate the patched library version.
  • If an immediate upgrade is not feasible, limit the acceptance of ICC profiles to trusted sources and manually validate any custom profiles before they are fed to the library.

Generated by OpenCVE AI on April 18, 2026 at 16:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 12 Jan 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Color
Color iccdev
Weaknesses CWE-843
CPEs cpe:2.3:a:color:iccdev:*:*:*:*:*:*:*:*
Vendors & Products Color
Color iccdev

Thu, 08 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Internationalcolorconsortium
Internationalcolorconsortium iccdev
Vendors & Products Internationalcolorconsortium
Internationalcolorconsortium iccdev

Wed, 07 Jan 2026 22:00:00 +0000

Type Values Removed Values Added
Description iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `CIccTagXmlTagData::ToXml()`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.
Title iccDEV has Type Confusion in CIccTagXmlTagData::ToXml()
Weaknesses CWE-20
CWE-457
CWE-475
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}


Subscriptions

Color Iccdev
Internationalcolorconsortium Iccdev
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-08T14:44:06.772Z

Reserved: 2026-01-02T18:45:27.397Z

Link: CVE-2026-21690

cve-icon Vulnrichment

Updated: 2026-01-08T14:44:00.330Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-07T22:15:45.383

Modified: 2026-01-12T18:26:22.213

Link: CVE-2026-21690

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:00:05Z