CVE-2026-27692
Published: 25 February 2026
Summary
CVE-2026-27692 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Color Iccdev. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 5.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Out-of-bounds writes that corrupt control flow or inject shellcode are rendered non-executable by the same memory protections.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability is triggered by processing a crafted malicious ICC profile file (enables T1204.002 User Execution via Malicious File) and produces application crashes for denial-of-service (enables T1499.004 Application or System Exploitation).
NVD Description
iccDEV provides a set of libraries and tools for working with ICC color management profiles. In versions up to and including 2.3.1.4, heap-buffer-overflow read occurs during CIccTagTextDescription::Release() when strlen() reads past a heap buffer while parsing ICC profile XML text…
more
description tags, causing a crash. Commit 29d088840b962a7cdd35993dfabc2cb35a049847 fixes the issue. No known workarounds are available.
Deeper analysisAI
CVE-2026-27692 is a heap-buffer-overflow read vulnerability (CWE-125, CWE-170, CWE-787) in iccDEV, a set of libraries and tools for working with ICC color management profiles. It affects versions up to and including 2.3.1.4. The flaw occurs in the CIccTagTextDescription::Release() function, where strlen() reads past the bounds of a heap buffer during parsing of ICC profile XML text description tags, resulting in a crash.
According to its CVSS 3.1 score of 7.1 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H), the vulnerability can be exploited by a local attacker with low complexity and no privileges required, but it demands user interaction. An attacker could craft a malicious ICC profile and trick a user into processing it via an application using iccDEV, achieving high confidentiality impact through potential information disclosure and high availability impact via denial-of-service crashes.
Mitigation is provided by commit 29d088840b962a7cdd35993dfabc2cb35a049847 in the iccDEV repository, which addresses the issue. No known workarounds are available. Further details appear in the GitHub security advisory GHSA-3869-prw8-gjqr, issue #609, and pull request #610.
Details
- CWE(s)