Cyber Posture

CVE-2026-27692

HighPublic PoC

Published: 25 February 2026

Published
25 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
EPSS Score 0.0002 5.5th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27692 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Color Iccdev. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 5.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Malicious File (T1204.002) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-787

Out-of-bounds writes that corrupt control flow or inject shellcode are rendered non-executable by the same memory protections.

MITRE ATT&CK Enterprise TechniquesAI

T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Vulnerability is triggered by processing a crafted malicious ICC profile file (enables T1204.002 User Execution via Malicious File) and produces application crashes for denial-of-service (enables T1499.004 Application or System Exploitation).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

iccDEV provides a set of libraries and tools for working with ICC color management profiles. In versions up to and including 2.3.1.4, heap-buffer-overflow read occurs during CIccTagTextDescription::Release() when strlen() reads past a heap buffer while parsing ICC profile XML text…

more

description tags, causing a crash. Commit 29d088840b962a7cdd35993dfabc2cb35a049847 fixes the issue. No known workarounds are available.

Deeper analysisAI

CVE-2026-27692 is a heap-buffer-overflow read vulnerability (CWE-125, CWE-170, CWE-787) in iccDEV, a set of libraries and tools for working with ICC color management profiles. It affects versions up to and including 2.3.1.4. The flaw occurs in the CIccTagTextDescription::Release() function, where strlen() reads past the bounds of a heap buffer during parsing of ICC profile XML text description tags, resulting in a crash.

According to its CVSS 3.1 score of 7.1 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H), the vulnerability can be exploited by a local attacker with low complexity and no privileges required, but it demands user interaction. An attacker could craft a malicious ICC profile and trick a user into processing it via an application using iccDEV, achieving high confidentiality impact through potential information disclosure and high availability impact via denial-of-service crashes.

Mitigation is provided by commit 29d088840b962a7cdd35993dfabc2cb35a049847 in the iccDEV repository, which addresses the issue. No known workarounds are available. Further details appear in the GitHub security advisory GHSA-3869-prw8-gjqr, issue #609, and pull request #610.

Details

CWE(s)

Affected Products

color
iccdev
≤ 2.3.1.4

CVEs Like This One

CVE-2026-24852Same product: Color Iccdev
CVE-2026-21491Same product: Color Iccdev
CVE-2026-21500Same product: Color Iccdev
CVE-2026-21686Same product: Color Iccdev
CVE-2026-21488Same product: Color Iccdev
CVE-2026-21681Same product: Color Iccdev
CVE-2026-21684Same product: Color Iccdev
CVE-2026-21680Same product: Color Iccdev
CVE-2026-21685Same product: Color Iccdev
CVE-2026-31792Same product: Color Iccdev

References