CVE-2026-40386
Published: 12 April 2026
Summary
CVE-2026-40386 is a medium-severity Wrap or Wraparound (CWE-191) vulnerability in Libexif Project Libexif. Its CVSS base score is 4.0 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 0.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely remediation through patching libexif to the fixed version directly eliminates the integer underflow in MakerNote decoding.
Validating the size and structure of Fuji and Olympus EXIF MakerNote tags before processing prevents triggering the underflow vulnerability.
Proper error handling during EXIF decoding mitigates crashes and information leaks resulting from the integer underflow.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Integer underflow in EXIF decoding enables local exploitation to crash applications (DoS) via crafted image files, directly mapping to application/system exploitation for endpoint DoS.
NVD Description
In libexif through 0.6.25, an integer underflow in size checking for Fuji and Olympus MakerNote decoding could be used by attackers to crash or leak information out of libexif-using programs.
Deeper analysisAI
CVE-2026-40386, published on 2026-04-12, is an integer underflow vulnerability (CWE-191) in the libexif library through version 0.6.25. The issue occurs in size checking during decoding of Fuji and Olympus MakerNote tags in EXIF data, with a CVSS v3.1 base score of 4.0 (AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L). It affects the libexif library itself and any applications that use it to process image metadata.
A local attacker with no privileges can exploit this vulnerability through a high-complexity attack without user interaction. Successful exploitation could lead to either a low-impact denial of service, such as crashing libexif-using programs, or low-impact information disclosure by leaking data from the affected processes.
A patch addressing this issue is available in the libexif GitHub repository at https://github.com/libexif/libexif/commit/dc6eac6e9655d14d0779d99e82d0f5f442d2f34b. Security practitioners should ensure libexif-using applications are updated to incorporate this fix.
Details
- CWE(s)