Cyber Posture

CVE-2025-61144

HighPublic PoC

Published: 23 February 2026

Published
23 February 2026
Modified
25 February 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0003 10.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-61144 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Libtiff Libtiff. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 10.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-119

Ongoing control assessments and code testing (static/dynamic analysis, fuzzing) surface memory buffer restriction failures, which are then remediated before release.

addresses: CWE-119

Managed runtimes used by platform-independent applications (e.g., JVM, CLR) enforce memory safety, preventing most buffer overflows that require direct memory manipulation.

addresses: CWE-119

Memory protections (e.g., W^X, ASLR) make exploitation of buffer-boundary violations far harder to turn into code execution.

addresses: CWE-119

Detects exploitation attempts that produce memory corruption, crashes, or anomalous behavior.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Stack overflow in image library enables client-side RCE via malicious TIFF file requiring user execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

libtiff up to v4.7.1 was discovered to contain a stack overflow via the readSeparateStripsIntoBuffer function.

Deeper analysisAI

CVE-2025-61144 is a stack overflow vulnerability affecting the libtiff library in versions up to and including 4.7.1. The flaw occurs in the readSeparateStripsIntoBuffer function and is classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer). Published on 2026-02-23, it carries a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).

The vulnerability can be exploited by a local attacker with low privileges who tricks a user into processing a malicious TIFF file, requiring user interaction. Successful exploitation leads to high impacts on confidentiality, integrity, and availability, potentially enabling arbitrary code execution, data corruption, or denial of service on the affected system.

Libtiff advisories and patches are documented in GitLab issue #740 and merge request #757, with fixes applied in commits 09f53a86cf26dfd961925227e59e180db617f26d and 88cf9dbb48f6e172629795ecffae35d5052f68aa. Security practitioners should update libtiff to incorporate these patches and avoid processing untrusted TIFF files with vulnerable versions. Further technical details are available in the referenced GitHub gist.

Details

CWE(s)

Affected Products

libtiff
libtiff
≤ 4.7.1

CVEs Like This One

CVE-2026-33847Shared CWE-119
CVE-2025-23397Shared CWE-119
CVE-2026-33851Shared CWE-119
CVE-2025-43264Shared CWE-119
CVE-2025-23398Shared CWE-119
CVE-2026-4775Same product: Libtiff Libtiff
CVE-2026-4710Shared CWE-119
CVE-2025-9185Shared CWE-119
CVE-2026-1260Shared CWE-119
CVE-2025-2750Shared CWE-119

References