Cyber Posture

CVE-2026-25583

HighPublic PoC

Published: 04 February 2026

Published
04 February 2026
Modified
18 February 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25583 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Color Iccdev. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 0.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Malicious File (T1204.002). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely identification, reporting, and correction of flaws, directly addressing this heap buffer overflow by mandating upgrades to the patched iccDEV version 2.3.1.3.

prevent

SI-16 enforces memory protection mechanisms such as ASLR, DEP, and heap cookies that directly mitigate exploitation of heap buffer overflows like the unchecked fread in CIccFileIO::Read8().

detect

RA-5 mandates vulnerability scanning to identify systems running vulnerable iccDEV versions prior to 2.3.1.3 affected by this CVE.

MITRE ATT&CK Enterprise TechniquesAI

T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Heap buffer overflow triggered by processing a malformed ICC profile file directly maps to user-assisted execution of malicious file content for RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.3, there is a heap buffer overflow vulnerability in CIccFileIO::Read8() when processing malformed ICC profile files…

more

via unchecked fread operation. This issue has been patched in version 2.3.1.3.

Deeper analysisAI

CVE-2026-25583 is a heap buffer overflow vulnerability in the iccDEV library, a set of tools and libraries for interacting with, manipulating, and applying ICC color management profiles. The flaw resides in the CIccFileIO::Read8() function, triggered by an unchecked fread operation when processing malformed ICC profile files. It affects iccDEV versions prior to 2.3.1.3 and is associated with CWEs-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), CWE-122 (Heap-based Buffer Overflow), and CWE-787 (Out-of-bounds Write).

The vulnerability can be exploited by a local attacker with no required privileges who tricks a user into opening or processing a specially crafted malformed ICC profile file, necessitating user interaction. Exploitation requires low attack complexity and local access. Successful attacks can result in high confidentiality, integrity, and availability impacts, potentially allowing arbitrary code execution, data corruption, or system crashes, as evidenced by its CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

Mitigation is available via an update to iccDEV version 2.3.1.3, which patches the unchecked fread issue. Security advisories and resources detail the fix, including the patching commit (https://github.com/InternationalColorConsortium/iccDEV/commit/8a6df2d8dac1e971a18be66fa36e3a0d6584f919), issue discussion (https://github.com/InternationalColorConsortium/iccDEV/issues/558), pull request (https://github.com/InternationalColorConsortium/iccDEV/pull/562), and GitHub security advisory (https://github.com/InternationalColorConsortium/iccDEV/security/advisories/GHSA-5ffg-r52h-fgw3). Practitioners should prioritize upgrading affected iccDEV deployments.

Details

CWE(s)

Affected Products

color
iccdev
≤ 2.3.1.3

CVEs Like This One

CVE-2026-25582Same product: Color Iccdev
CVE-2026-21504Same product: Color Iccdev
CVE-2026-21679Same product: Color Iccdev
CVE-2026-21501Same product: Color Iccdev
CVE-2026-21488Same product: Color Iccdev
CVE-2026-21490Same product: Color Iccdev
CVE-2026-21494Same product: Color Iccdev
CVE-2026-31796Same product: Color Iccdev
CVE-2026-21489Same product: Color Iccdev
CVE-2026-30985Same product: Color Iccdev

References