Cyber Posture

CVE-2026-27280

High

Published: 10 March 2026

Published
10 March 2026
Modified
12 March 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0001 1.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27280 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Adobe Dng Software Development Kit. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 1.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely patching and remediation of the out-of-bounds write flaw in the DNG SDK as recommended in Adobe's security bulletin.

prevent

Provides memory protections such as non-executable memory and stack guards that mitigate exploitation of out-of-bounds writes leading to arbitrary code execution.

prevent

Mandates validation of untrusted DNG file inputs to block malformed data that triggers the out-of-bounds write during processing.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Out-of-bounds write in DNG file parser enables arbitrary code execution on client when victim opens malicious file (T1203 Exploitation for Client Execution + T1204.002 Malicious File).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must…

more

open a malicious file.

Deeper analysisAI

CVE-2026-27280 is an out-of-bounds write vulnerability (CWE-787) affecting Adobe DNG SDK versions 1.7.1 build 2471 and earlier. The flaw occurs during processing of DNG files and can lead to arbitrary code execution in the context of the current user. It has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high impact with low attack complexity but requiring local access and user interaction.

Exploitation requires an attacker to deliver a specially crafted malicious DNG file to a victim, who must then open it using an affected application leveraging the DNG SDK. No special privileges are needed (PR:N), and successful exploitation allows arbitrary code execution with the privileges of the current user, potentially enabling full system compromise on the victim's machine.

The official Adobe security bulletin APSB26-30, available at https://helpx.adobe.com/security/products/dng-sdk/apsb26-30.html, provides details on the vulnerability, affected versions, and recommended mitigations, including updates to patched versions of the DNG SDK.

Details

CWE(s)

Affected Products

adobe
dng software development kit
≤ 1.7.1

CVEs Like This One

CVE-2026-21352Same product: Adobe Dng Software Development Kit
CVE-2026-21353Same product: Adobe Dng Software Development Kit
CVE-2025-21136Same vendor: Adobe
CVE-2025-24450Same vendor: Adobe
CVE-2026-21305Same vendor: Adobe
CVE-2026-21307Same vendor: Adobe
CVE-2025-24445Same vendor: Adobe
CVE-2026-21349Same vendor: Adobe
CVE-2026-21334Same vendor: Adobe
CVE-2026-21298Same vendor: Adobe

References