Cyber Posture

CVE-2024-55194

CriticalPublic PoC

Published: 23 January 2025

Published
23 January 2025
Modified
29 January 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0024 46.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in client applications to execute code.

Security Summary

CVE-2024-55194 is a heap overflow vulnerability affecting OpenImageIO version 3.1.0.0dev, specifically within the component located at /OpenImageIO/fmath.h. The issue corresponds to CWE-787 (Out-of-bounds Write) and CWE-120 (Buffer Copy without Checking Size of Input), earning a CVSS v3.1 base score of 9.8, indicating critical severity due to its potential for high impact on confidentiality, integrity, and availability.

The vulnerability enables exploitation over a network by unauthenticated attackers with low complexity and no user interaction required, as per the CVSS vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. Successful exploitation could allow remote attackers to trigger the heap overflow, potentially leading to arbitrary code execution, data corruption, or denial of service by compromising the affected application's memory handling.

The vulnerability was reported in GitHub issue #4552 on the AcademySoftwareFoundation/OpenImageIO repository, with references pointing to this issue for further details on discovery and discussion. No specific patch or mitigation details are outlined in the provided CVE information.

Details

CWE(s)
CWE-787CWE-120

Affected Products

openimageio
openimageio
3.1.0.0

MITRE ATT&CK Enterprise Techniques

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Heap buffer overflow in OpenImageIO image processing (fmath.h during pixel stats computation) enables arbitrary code execution via crafted malicious images in vulnerable client applications.

References