Cyber Posture

CVE-2026-20911

CriticalPublic PoC

Published: 07 April 2026

Published
07 April 2026
Modified
10 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 18.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-20911 is a critical-severity Incorrect Calculation of Buffer Size (CWE-131) vulnerability in Libraw Libraw. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates timely flaw remediation through patching vulnerable LibRaw versions affected by the heap buffer overflow in HuffTable::initval.

prevent

Implements memory protection mechanisms such as ASLR and DEP that directly mitigate exploitation of heap buffer overflows triggered by malicious files.

prevent

Requires validation of untrusted image file inputs to block specially crafted files from triggering the LibRaw buffer overflow during processing.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Heap buffer overflow in LibRaw file parser enables unauthenticated remote code execution via malicious input file, directly mapping to public-facing app exploitation and client-side execution techniques.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A heap-based buffer overflow vulnerability exists in the HuffTable::initval functionality of LibRaw Commit 0b56545 and Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

Deeper analysisAI

A heap-based buffer overflow vulnerability, tracked as CVE-2026-20911, affects the HuffTable::initval functionality in LibRaw at commits 0b56545 and d20315b. This flaw, associated with CWE-131 (Incorrect Calculation of Buffer Size), can be triggered by processing a specially crafted malicious file, leading to a heap buffer overflow. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for severe impact.

Any remote attacker can exploit this vulnerability without authentication or user interaction by supplying a malicious file to a vulnerable LibRaw instance, such as in image processing applications that rely on the library. Successful exploitation could result in arbitrary code execution, data corruption, or denial of service, with high impacts on confidentiality, integrity, and availability.

Mitigation details and additional technical analysis are provided in the Talos Intelligence advisory at https://talosintelligence.com/vulnerability_reports/TALOS-2026-2330. Security practitioners should review the report for patching guidance specific to affected LibRaw versions and consider input validation for file processing workflows.

Details

CWE(s)

Affected Products

libraw
libraw
0.22.0, 0.22.1

CVEs Like This One

CVE-2026-20889Same product: Libraw Libraw
CVE-2026-21413Same product: Libraw Libraw
CVE-2026-24660Same product: Libraw Libraw
CVE-2026-20884Same product: Libraw Libraw
CVE-2026-24450Same product: Libraw Libraw
CVE-2026-1949Shared CWE-131
CVE-2025-1861Shared CWE-131
CVE-2026-1188Shared CWE-131
CVE-2019-25555Shared CWE-131
CVE-2026-33986Shared CWE-131

References