Cyber Posture

CVE-2025-2756

MediumPublic PoC

Published: 25 March 2025

Published
25 March 2025
Modified
17 July 2025
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS Score 0.0012 30.4th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-2756 is a medium-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Assimp Assimp. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 30.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the heap-based buffer overflow by requiring timely patching or upgrading of the vulnerable Assimp library version 5.4.3.

prevent

Implements memory protections such as ASLR, DEP/NX, and stack canaries that prevent or hinder exploitation of the heap buffer overflow in Assimp's AC3D importer.

prevent

Requires validation of AC3D file inputs to restrict malformed data that triggers the buffer overflow in Assimp::AC3DImporter::ConvertObjectSection.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Heap-based buffer overflow in Assimp AC3D file parser enables remote code execution via malicious file processed by vulnerable applications, facilitating Exploitation for Client Execution.

NVD Description

A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::AC3DImporter::ConvertObjectSection of the file code/AssetLib/AC/ACLoader.cpp of the component AC3D File Handler. The manipulation of the argument tmp leads to heap-based buffer…

more

overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Deeper analysisAI

CVE-2025-2756 is a heap-based buffer overflow vulnerability in the Open Asset Import Library (Assimp) version 5.4.3. It affects the Assimp::AC3DImporter::ConvertObjectSection function within the file code/AssetLib/AC/ACLoader.cpp, specifically in the AC3D File Handler component. The issue arises from manipulation of the 'tmp' argument, as classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-122 (Heap-based Buffer Overflow). The vulnerability received a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) and was published on 2025-03-25.

The vulnerability can be exploited remotely by an unauthenticated attacker with no privileges, requiring user interaction such as opening a maliciously crafted AC3D file. Successful exploitation leads to limited impacts on confidentiality, integrity, and availability, potentially allowing arbitrary code execution or denial of service via the buffer overflow.

Advisories and discussions are available in referenced sources, including GitHub issues #6018 and #6018#issue-2877375815, as well as VulDB entries at ctiid.300861, id.300861, and submit.517790. The exploit has been publicly disclosed and may be used.

Notable context includes the public disclosure of the exploit, enabling potential widespread use against applications relying on Assimp for 3D asset parsing.

Details

CWE(s)

Affected Products

assimp
assimp
5.4.3

CVEs Like This One

CVE-2025-2757Same product: Assimp Assimp
CVE-2025-2754Same product: Assimp Assimp
CVE-2025-3015Same product: Assimp Assimp
CVE-2025-2592Same product: Assimp Assimp
CVE-2025-2750Same product: Assimp Assimp
CVE-2025-2751Same product: Assimp Assimp
CVE-2025-2151Same product: Assimp Assimp
CVE-2025-2152Same product: Assimp Assimp
CVE-2025-2755Same product: Assimp Assimp
CVE-2025-2752Same product: Assimp Assimp

References