Cyber Posture

CVE-2025-2152

MediumPublic PoC

Published: 10 March 2025

Published
10 March 2025
Modified
13 March 2025
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS Score 0.0011 28.7th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user opening a malicious file in order to gain execution.

Security Summary

CVE-2025-2152 is a heap-based buffer overflow vulnerability classified as critical in the Open Asset Import Library (Assimp) version 5.4.3. The issue resides in the Assimp::BaseImporter::ConvertToUTF8 function within the BaseImporter.cpp file, part of the File Handler component. It carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) and is associated with CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), CWE-122 (Heap-based Buffer Overflow), and CWE-787 (Out-of-bounds Write).

Remote attackers can exploit this vulnerability by manipulating inputs to the affected function, requiring user interaction such as opening a specially crafted file in an application that uses Assimp for asset import. Successful exploitation could result in limited impacts: low confidentiality (C:L), integrity (I:L), and availability (A:L) effects, potentially allowing partial data exposure, modification, or denial of service via the heap overflow. No privileges are needed, and the attack complexity is low, though it depends on tricking users into processing malicious files.

Advisories and details are documented in GitHub issues at https://github.com/assimp/assimp/issues/6027 and https://github.com/assimp/assimp/issues/6027#issue-2877629241, as well as VulDB entries at https://vuldb.com/?ctiid.299063, https://vuldb.com/?id.299063, and https://vuldb.com/?submit.510818. Security practitioners should consult these sources for any patches or workarounds.

The vulnerability was published on 2025-03-10, and the exploit has been publicly disclosed, making it available for potential use by attackers.

Details

CWE(s)
CWE-119CWE-122CWE-787

Affected Products

assimp
assimp
5.4.3

MITRE ATT&CK Enterprise Techniques

T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

The vulnerability is a heap-based buffer overflow in a file parsing library (Assimp), directly exploitable via user interaction with a specially crafted file, mapping to malicious file delivery for execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References