CVE-2026-34553
Received Received - Intake
Logic Flaw in iccDEV LUT Dump Causes Incorrect Output

Publication date: 2026-03-31

Last updated on: 2026-04-20

Assigner: GitHub, Inc.

Description
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a defect in LUT dump/iteration logic affecting CIccCLUT::Iterate() and output produced by CIccMBB::Describe() (via CLUT dumping). This issue has been patched in version 2.3.1.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-20
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
color iccdev to 2.3.1.6 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-562 A function returns the address of a stack variable, which will cause unintended program behavior, typically in the form of a crash.
CWE-665 The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in iccDEV, a set of libraries and tools for working with ICC color management profiles. Before version 2.3.1.6, there was a defect in the LUT dump and iteration logic affecting the functions CIccCLUT::Iterate() and the output produced by CIccMBB::Describe() when dumping CLUTs (Color Look-Up Tables). This defect could cause incorrect processing or output related to color management profiles.

The issue has been fixed in version 2.3.1.6.


How can this vulnerability impact me? :

The vulnerability has a CVSS base score of 4.0, indicating a low to medium severity. It requires local access (AV:L) and low attack complexity (AC:L), with no privileges required (PR:N) and no user interaction (UI:N).

The impact is limited to integrity (I:L) with no confidentiality (C:N) or availability (A:N) impact. This means the vulnerability could cause incorrect or altered output in color management processes, potentially leading to integrity issues in color data processing, but it does not affect confidentiality or availability.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update iccDEV to version 2.3.1.6 or later, where the defect in LUT dump/iteration logic has been patched.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart