Impact
A malicious PTP ObjectInfo response can cause libgphoto2 to read up to nine bytes past the validated boundary in the ptp_unpack_OI() function. This out‑of‑bounds read may leak raw memory data that the camera driver or the application handling the camera can access, leading to information disclosure. The flaw is classified as CWE‑125, an out‑of‑bounds read weakness.
Affected Systems
The vulnerability is present in libgphoto2 versions up to and including 2.5.33, which is the camera access and control library used by many desktop and embedded applications that communicate with cameras via PTP over USB or similar protocols.
Risk and Exploitability
The CVSS score of 6.1 indicates a moderate severity. No EPSS score is available, so the exploitation likelihood cannot be quantified, but the vulnerability is not currently listed in the CISA KEV catalog. The attack vector is inferred to be remote or locally privileged, as an attacker must supply a crafted PTP ObjectInfo response that is accepted by libgphoto2, typically through a connected camera device or a compromised camera firmware.
OpenCVE Enrichment