Cyber Posture

CVE-2026-20884

HighPublic PoC

Published: 07 April 2026

Published
07 April 2026
Modified
10 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 18.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-20884 is a high-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Libraw Libraw. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 18.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the integer overflow vulnerability in LibRaw by requiring timely application of patches to affected versions.

prevent

Requires validation of DNG file inputs to detect and reject specially crafted malicious files before processing in deflate_dng_load_raw.

prevent

Implements memory protections like ASLR and heap hardening to mitigate successful exploitation of the heap buffer overflow.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Integer overflow leading to heap buffer overflow in image library enables arbitrary code execution via malicious DNG file (T1204.002) or client-side exploitation (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An integer overflow vulnerability exists in the deflate_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

Deeper analysisAI

An integer overflow vulnerability, tracked as CVE-2026-20884, affects the deflate_dng_load_raw functionality in LibRaw at commit 8dc68e2. This flaw allows a specially crafted malicious file to trigger a heap buffer overflow. LibRaw is a library commonly used for processing raw image files, making applications that rely on it for DNG file handling potentially susceptible.

The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity with network vector, high attack complexity, no privileges or user interaction required, and significant impacts on confidentiality, integrity, and availability. An attacker can exploit it by supplying a malicious file to a vulnerable LibRaw instance, potentially leading to arbitrary code execution or denial of service through the heap overflow.

Mitigation details are available in the Talos Intelligence advisories at https://talosintelligence.com/vulnerability_reports/TALOS-2026-2364 and https://www.talosintelligence.com/vulnerability_reports/TALOS-2026-2364. Security practitioners should review these reports for patch information, workarounds, and affected versions.

Details

CWE(s)

Affected Products

libraw
libraw
0.22.1

CVEs Like This One

CVE-2026-20889Same product: Libraw Libraw
CVE-2026-24660Same product: Libraw Libraw
CVE-2026-24450Same product: Libraw Libraw
CVE-2026-21413Same product: Libraw Libraw
CVE-2026-20911Same product: Libraw Libraw
CVE-2026-21321Shared CWE-190
CVE-2026-24875Shared CWE-190
CVE-2026-40250Shared CWE-190
CVE-2026-3308Shared CWE-190
CVE-2026-4775Shared CWE-190

References