Description
An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because malformed VRML input can trigger dereference of a corrupt or unvalidated pointer during shape construction in libTKDEVRML.so.
Published: 2026-05-01
Score: 5.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability exists in the VRML V2.0 parser component of Open CASCADE Technology (OCCT), specifically in the VrmlData_IndexedFaceSet::TShape routine. Malformed VRML input can cause the parser to dereference a corrupt or unvalidated pointer while constructing a shape in libTKDEVRML.so, leading to an application crash. The impact is a denial of service that can affect any system running the vulnerable OCCT library and processing untrusted VRML files.

Affected Systems

The affected software is Open CASCADE Technology version 8.0.0_rc5. No other vendor or product versions are listed in the advisory. Users running this release, or any build that includes the unpatched libTKDEVRML.so, are at risk if they parse malicious VRML content.

Risk and Exploitability

The CVSS score is 5.5, but the nature of the flaw—an unchecked pointer dereference triggered by crafted input—suggests a high likelihood of exploitation in environments where the library processes user-supplied VRML files. Exploitation requires only that a malicious VRML file be fed to the parser; no special privileges are needed. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, but the potential for widespread denial of service remains if the vulnerable OCCT version is deployed without restriction.

Generated by OpenCVE AI on May 2, 2026 at 08:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open CASCADE Technology to a version where the VRML parser bug is fixed (e.g., 8.0.0 or later).
  • If an upgrade cannot be performed, configure the application to reject or quarantine any untrusted VRML files before parsing, ensuring only validated or signed content is accepted.
  • Deploy runtime monitoring to detect and isolate crashes in libTKDEVRML.so, and restart affected processes to mitigate transient denial of service incidents.

Generated by OpenCVE AI on May 2, 2026 at 08:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 08:30:00 +0000

Type Values Removed Values Added
Title Denial of Service via Crafted VRML File in Open CASCADE V8_0_0_rc5

Fri, 01 May 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Fri, 01 May 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Opencascade
Opencascade open Cascade Technology
Weaknesses CWE-476
CPEs cpe:2.3:a:opencascade:open_cascade_technology:*:*:*:*:*:*:*:*
cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:opencascade:open_cascade_technology:8.0.0:rc5:*:*:*:*:*:*
Vendors & Products Opencascade
Opencascade open Cascade Technology
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Fri, 01 May 2026 15:00:00 +0000

Type Values Removed Values Added
Description An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because malformed VRML input can trigger dereference of a corrupt or unvalidated pointer during shape construction in libTKDEVRML.so.
References

Subscriptions

Opencascade Open Cascade Technology
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-01T18:31:22.848Z

Reserved: 2026-04-27T00:00:00.000Z

Link: CVE-2026-42478

cve-icon Vulnrichment

Updated: 2026-05-01T18:31:19.161Z

cve-icon NVD

Status : Modified

Published: 2026-05-01T15:16:43.857

Modified: 2026-05-01T19:16:32.093

Link: CVE-2026-42478

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T08:15:16Z

Weaknesses