Cyber Posture

CVE-2026-21692

HighPublic PoC

Published: 07 January 2026

Published
07 January 2026
Modified
12 January 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0013 31.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `ToXmlCurve()` at `IccXML/IccLibXML/IccMpeXml.cpp`. This vulnerability affects…

more

users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely remediation of flaws such as this type confusion vulnerability by applying the patch in iccDEV version 2.3.1.2.

prevent

SI-10 mandates validation of information inputs like ICC color profiles to prevent improper processing that triggers the type confusion in ToXmlCurve().

prevent

SI-16 implements memory protections that mitigate exploitation of type confusion vulnerabilities leading to arbitrary code execution or corruption.

Security SummaryAI

CVE-2026-21692 is a Type Confusion vulnerability in the iccDEV library, which provides tools and libraries for interacting with, manipulating, and applying International Color Consortium (ICC) color management profiles. The flaw resides in the `ToXmlCurve()` function within the file `IccXML/IccLibXML/IccMpeXml.cpp` and affects all versions prior to 2.3.1.2. It impacts any applications or users of the iccDEV library that process ICC color profiles.

The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating it is exploitable over the network with low complexity, no privileges required, but user interaction is needed. Attackers can craft malicious ICC profiles to trigger the type confusion when processed by affected software, potentially leading to high-impact consequences including arbitrary code execution, data corruption, or denial of service, as reflected in the associated CWEs: CWE-20 (Improper Input Validation), CWE-588 (Attempt to Access Child of a Non-structure Type), CWE-704 (Incorrect Type Conversion or Cast), and CWE-843 (Access of Resource Using Incompatible Type).

Mitigation is available via an update to iccDEV version 2.3.1.2, which includes a patch for the issue. No known workarounds exist. Relevant advisories and fixes are detailed in the GitHub security advisory (GHSA-7662-mf46-wr88), issue tracker (#388), and pull request (#432) from the InternationalColorConsortium/iccDEV repository.

Details

CWE(s)

Affected Products

color
iccdev
≤ 2.3.1.2

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Type confusion in iccDEV library enables arbitrary code execution via crafted ICC profiles processed by client applications, directly facilitating Exploitation for Client Execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References