Impact
An out-of-bounds write flaw exists in Adobe DNG SDK versions 1.7.1 2471 and earlier, allowing a crafted DNG file to overflow a buffer during processing. The overflow can be triggered when a user opens the malicious file, leading to the execution of attacker‑controlled code with the privileges of the local user. This vulnerability is a classic example of CWE‑787, a memory corruption weakness that permits arbitrary code execution.
Affected Systems
Adobe DNG SDK, versions 1.7.1 2471 and all earlier releases. The issue is present in the software development kit used to parse DNG images and is vendor‑specific to Adobe.
Risk and Exploitability
The CVSS score of 7.8 reflects a moderate to high severity, while the EPSS score of less than 1% indicates a very low likelihood of exploitation in the wild. The attack requires user interaction: a victim must open a malicious DNG file, which reduces the opportunistic exploitation probability. The vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed widespread attacks yet, but the potential for arbitrary code execution warrants attention.
OpenCVE Enrichment