Cyber Posture

CVE-2026-21678

HighPublic PoC

Published: 07 January 2026

Published
07 January 2026
Modified
13 January 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0004 12.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-21678 is a high-severity Improper Input Validation (CWE-20) vulnerability in Color Iccdev. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 12.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely remediation by applying the official patch in iccDEV version 2.3.1.2 to eliminate the heap-buffer-overflow vulnerability in IccTagXml().

prevent

Enforces validation of ICC profile inputs prior to processing by IccTagXml(), directly countering the improper input validation (CWE-20) that enables the buffer overflow.

prevent

Deploys memory protection safeguards like ASLR, DEP, and heap canaries to hinder arbitrary code execution from the heap-buffer-overflow in iccDEV.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Vulnerability is a client-side buffer overflow in an ICC profile parser, directly enabling code execution via a malicious file opened by the user.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, iccDEV is vulnerable to heap-buffer-overflow vulnerability in IccTagXml(). This issue has been patched in version…

more

2.3.1.2.

Deeper analysisAI

CVE-2026-21678 is a heap-buffer-overflow vulnerability in the IccTagXml() function of iccDEV, a set of libraries and tools for interacting with, manipulating, and applying ICC color management profiles. The flaw affects versions of iccDEV prior to 2.3.1.2 and has been assigned a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). It is associated with CWEs 20 (Improper Input Validation), 122 (Heap-based Buffer Overflow), 125 (Out-of-bounds Read), and 787 (Out-of-bounds Write).

A local attacker can exploit this vulnerability by tricking a user into processing a specially crafted ICC color profile file with an affected version of iccDEV. No privileges are required (PR:N), and the attack has low complexity (AC:L) but requires user interaction (UI:R), such as opening the malicious file in a compatible application. Successful exploitation enables high-impact consequences, including arbitrary code execution with the privileges of the user running the process, potentially leading to unauthorized data access, modification, or denial of service.

Mitigation is available via an official patch in iccDEV version 2.3.1.2, as detailed in the project's GitHub security advisory (GHSA-9rp2-4c6g-hppf), the fixing commit (c6c0f1cf45b48db94266132ccda5280a1a33569d), the related issue (#55), and pull request (#219). Security practitioners should advise users and downstream applications handling ICC profiles to update immediately and validate inputs to IccTagXml() where possible.

Details

CWE(s)

Affected Products

color
iccdev
≤ 2.3.1.2

CVEs Like This One

CVE-2026-31796Same product: Color Iccdev
CVE-2026-25582Same product: Color Iccdev
CVE-2026-30985Same product: Color Iccdev
CVE-2026-30979Same product: Color Iccdev
CVE-2026-22046Same product: Color Iccdev
CVE-2026-21676Same product: Color Iccdev
CVE-2026-21683Same product: Color Iccdev
CVE-2026-30987Same product: Color Iccdev
CVE-2026-31795Same product: Color Iccdev
CVE-2026-24856Same product: Color Iccdev

References