Cyber Posture

CVE-2025-2592

MediumPublic PoC

Published: 21 March 2025

Published
21 March 2025
Modified
17 July 2025
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS Score 0.0007 21.5th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-2592 is a medium-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Assimp Assimp. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 21.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Malicious File (T1204.002). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely flaw remediation, directly addressing this CVE by applying the specific patch to fix the heap buffer overflow in Assimp.

prevent

SI-16 implements memory protections like ASLR and DEP that comprehensively mitigate exploitation of heap buffer overflows even if unpatched.

prevent

SI-10 enforces validation of CSM file inputs prior to processing by Assimp, preventing malformed data from triggering the buffer overflow.

MITRE ATT&CK Enterprise TechniquesAI

T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

The vulnerability is a buffer overflow triggered by processing a malformed CSM file in Assimp, requiring user interaction to load the malicious file, directly enabling user execution via malicious file.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp 5.4.3. This issue affects the function CSMImporter::InternReadFile of the file code/AssetLib/CSM/CSMLoader.cpp. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely.…

more

The exploit has been disclosed to the public and may be used. The patch is named 2690e354da0c681db000cfd892a55226788f2743. It is recommended to apply a patch to fix this issue.

Deeper analysisAI

CVE-2025-2592 is a heap-based buffer overflow vulnerability classified as critical in the Open Asset Import Library (Assimp) version 5.4.3. The issue resides in the CSMImporter::InternReadFile function within the file code/AssetLib/CSM/CSMLoader.cpp. This flaw allows manipulation that triggers the overflow when processing malformed input.

The vulnerability can be exploited remotely by unauthenticated attackers (PR:N) over the network (AV:N) with low attack complexity (AC:L), but requires user interaction (UI:R), such as tricking a user into loading a malicious file processed by Assimp. Successful exploitation results in low-impact violations of confidentiality, integrity, and availability (C:L/I:L/A:L), with a CVSS v3.1 base score of 6.3. An exploit has been publicly disclosed and may be usable.

Mitigation is available via a specific patch commit, 2690e354da0c681db000cfd892a55226788f2743, and vendors are recommended to apply it. Related GitHub discussions include issues #6010 and pull request #6052, with further details on VulDB.

Details

CWE(s)

Affected Products

assimp
assimp
5.4.3

CVEs Like This One

CVE-2025-2152Same product: Assimp Assimp
CVE-2025-2755Same product: Assimp Assimp
CVE-2025-2753Same product: Assimp Assimp
CVE-2025-15538Same product: Assimp Assimp
CVE-2025-2757Same product: Assimp Assimp
CVE-2025-2754Same product: Assimp Assimp
CVE-2025-2756Same product: Assimp Assimp
CVE-2025-2750Same product: Assimp Assimp
CVE-2025-2752Same product: Assimp Assimp
CVE-2025-2151Same product: Assimp Assimp

References