CVE-2026-21507
Published: 06 January 2026
Summary
CVE-2026-21507 is a high-severity Infinite Loop (CWE-835) vulnerability in Color Iccdev. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 25.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Infinite loop in profile processing directly enables application-layer DoS via crafted input (T1499.004).
NVD Description
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Versions 2.3.1 and below have an infinite loop in the IccProfile.cpp function, CalcProfileID. This issue is fixed in version 2.3.1.1.
Deeper analysisAI
CVE-2026-21507 affects iccDEV, a set of libraries and tools for working with ICC color management profiles. Versions 2.3.1 and prior contain an infinite loop vulnerability in the CalcProfileID function within IccProfile.cpp, classified under CWE-835 (Loop with Unreachable Exit Condition). The issue received a CVSS v3.1 base score of 7.5, reflecting high severity due to its potential for denial-of-service impact.
A remote, unauthenticated attacker with network access can exploit this vulnerability with low complexity and no user interaction required. By providing a specially crafted ICC profile that triggers the infinite loop during profile ID calculation, the attacker can cause the affected iccDEV component to hang or consume excessive resources, resulting in high availability disruption (A:H) with no impact on confidentiality or integrity.
Mitigation is available via an official patch in iccDEV version 2.3.1.1, as detailed in the project's GitHub security advisory (GHSA-hgp5-r8m9-8qpj), issue tracker (#244), and the fixing commit (3f3ce789d0d2b608c194ed172fa38943519dc198). Security practitioners should prioritize updating to the patched version and validate ICC profiles processed by iccDEV in affected environments.
Details
- CWE(s)