Cyber Posture

CVE-2025-3015

MediumPublic PoC

Published: 31 March 2025

Published
31 March 2025
Modified
17 April 2025
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS Score 0.0014 32.9th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-3015 is a medium-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Assimp Assimp. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 32.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the out-of-bounds read vulnerability in Assimp 5.4.3 by requiring timely application of the vendor patch or upgrade to version 6.0.

prevent

Requires validation of ASE file inputs to the Assimp parser to detect and reject malformed mIndices arguments that trigger the out-of-bounds read.

prevent

Implements memory safeguards such as address space layout randomization and data execution prevention to mitigate exploitation of the out-of-bounds read for information disclosure or denial of service.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Out-of-bounds read (CWE-125) in Assimp ASE file handler exploitable remotely via malformed ASE file with user interaction (e.g., loading in vulnerable client apps), enabling code execution via client-side software vulnerability.

NVD Description

A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASEImporter::BuildUniqueRepresentation of the file code/AssetLib/ASE/ASELoader.cpp of the component ASE File Handler. The manipulation of the argument mIndices leads to out-of-bounds read.…

more

It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0 is able to address this issue. The patch is named 7c705fde418d68cca4e8eff56be01b2617b0d6fe. It is recommended to apply a patch to fix this issue.

Deeper analysisAI

CVE-2025-3015 is a vulnerability in the Open Asset Import Library (Assimp) version 5.4.3 that enables an out-of-bounds read. It affects the Assimp::ASEImporter::BuildUniqueRepresentation function within the file code/AssetLib/ASE/ASELoader.cpp, specifically the ASE File Handler component. The issue arises from manipulation of the mIndices argument, classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-125 (Out-of-bounds Read), with a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L).

The vulnerability can be exploited remotely by an attacker who tricks a user into processing a specially crafted ASE file, as it requires user interaction but no privileges. Successful exploitation leads to limited impacts on confidentiality, integrity, and availability, such as potential information disclosure or denial of service through memory corruption. The exploit has been publicly disclosed and may be used in attacks against applications that rely on Assimp for ASE file parsing.

Mitigation involves upgrading to Assimp version 6.0, which addresses the issue. A specific patch is available at commit 7c705fde418d68cca4e8eff56be01b2617b0d6fe, and applying it is recommended. Additional details are documented in Assimp GitHub issues #6021 and pull request #6045, along with the VulDB entry.

Details

CWE(s)

Affected Products

assimp
assimp
5.4.3

CVEs Like This One

CVE-2025-2751Same product: Assimp Assimp
CVE-2025-2757Same product: Assimp Assimp
CVE-2025-2754Same product: Assimp Assimp
CVE-2025-2756Same product: Assimp Assimp
CVE-2025-2755Same product: Assimp Assimp
CVE-2025-2752Same product: Assimp Assimp
CVE-2025-2753Same product: Assimp Assimp
CVE-2025-2750Same product: Assimp Assimp
CVE-2025-2151Same product: Assimp Assimp
CVE-2025-15538Same product: Assimp Assimp

References