CVE-2020-28610: CWE-129: Improper Validation of Array Index in CGAL Project libcgal
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SM_io_parser.h SM_io_parser<Decorator_>::read_vertex() set_face().
AI Analysis
Technical Summary
CVE-2020-28610 is a medium severity vulnerability identified in version 5.1.1 of the CGAL Project's libcgal library, specifically within the Nef polygon-parsing functionality. The root cause is improper validation of array indices (CWE-129) in the code handling polygon data structures. The vulnerability manifests as an out-of-bounds (OOB) read and type confusion triggered by specially crafted malformed input files. The affected code is located in the SM_io_parser<Decorator_>::read_vertex() and set_face() functions within the Nef_S2/SM_io_parser.h file. An attacker can exploit this by supplying malicious polygon files that cause the parser to read beyond the bounds of allocated arrays, leading to memory corruption. This memory corruption can result in type confusion, which may allow an attacker to execute arbitrary code within the context of the vulnerable application. The vulnerability does not require authentication but does require the application to process attacker-controlled polygon files, which implies user interaction or automated processing of untrusted inputs. No known exploits have been reported in the wild, and no official patches or fixes have been linked in the provided data. The vulnerability affects only CGAL version 5.1.1, a computational geometry library widely used in scientific computing, CAD, GIS, and other domains requiring complex geometric computations.
Potential Impact
European organizations utilizing CGAL libcgal 5.1.1 in their software stacks, especially those involved in CAD, GIS, scientific research, or engineering applications, face risks including unauthorized code execution, data corruption, and potential system compromise. Exploitation could lead to loss of confidentiality if sensitive data is accessed, integrity violations through corrupted geometric data, and availability issues if the application crashes or behaves unpredictably. Given the specialized nature of CGAL, the impact is likely concentrated in sectors relying on computational geometry, such as aerospace, automotive, manufacturing, and geospatial services. Compromise of such systems could disrupt critical design and analysis workflows, leading to operational delays and financial losses. Additionally, if these systems are integrated into larger enterprise environments or connected to networks, the vulnerability could serve as a foothold for lateral movement or further attacks. The lack of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits over time.
Mitigation Recommendations
Upgrade to a later, patched version of CGAL libcgal once available, as no patch is currently linked for version 5.1.1. Implement strict input validation and sanitization on all polygon files before processing, including rejecting malformed or suspicious files. Employ sandboxing or containerization for applications processing untrusted polygon data to limit potential damage from exploitation. Monitor application logs for unusual parsing errors or crashes that could indicate exploitation attempts. Restrict access to systems processing CGAL polygon files to trusted users and networks to reduce exposure. Conduct code audits and static analysis on custom software integrating libcgal to identify and remediate unsafe handling of polygon data. Where feasible, replace or supplement CGAL components with alternative libraries that have active maintenance and security support.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden, Finland, Belgium, Spain, Switzerland
CVE-2020-28610: CWE-129: Improper Validation of Array Index in CGAL Project libcgal
Description
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SM_io_parser.h SM_io_parser<Decorator_>::read_vertex() set_face().
AI-Powered Analysis
Technical Analysis
CVE-2020-28610 is a medium severity vulnerability identified in version 5.1.1 of the CGAL Project's libcgal library, specifically within the Nef polygon-parsing functionality. The root cause is improper validation of array indices (CWE-129) in the code handling polygon data structures. The vulnerability manifests as an out-of-bounds (OOB) read and type confusion triggered by specially crafted malformed input files. The affected code is located in the SM_io_parser<Decorator_>::read_vertex() and set_face() functions within the Nef_S2/SM_io_parser.h file. An attacker can exploit this by supplying malicious polygon files that cause the parser to read beyond the bounds of allocated arrays, leading to memory corruption. This memory corruption can result in type confusion, which may allow an attacker to execute arbitrary code within the context of the vulnerable application. The vulnerability does not require authentication but does require the application to process attacker-controlled polygon files, which implies user interaction or automated processing of untrusted inputs. No known exploits have been reported in the wild, and no official patches or fixes have been linked in the provided data. The vulnerability affects only CGAL version 5.1.1, a computational geometry library widely used in scientific computing, CAD, GIS, and other domains requiring complex geometric computations.
Potential Impact
European organizations utilizing CGAL libcgal 5.1.1 in their software stacks, especially those involved in CAD, GIS, scientific research, or engineering applications, face risks including unauthorized code execution, data corruption, and potential system compromise. Exploitation could lead to loss of confidentiality if sensitive data is accessed, integrity violations through corrupted geometric data, and availability issues if the application crashes or behaves unpredictably. Given the specialized nature of CGAL, the impact is likely concentrated in sectors relying on computational geometry, such as aerospace, automotive, manufacturing, and geospatial services. Compromise of such systems could disrupt critical design and analysis workflows, leading to operational delays and financial losses. Additionally, if these systems are integrated into larger enterprise environments or connected to networks, the vulnerability could serve as a foothold for lateral movement or further attacks. The lack of known exploits reduces immediate threat but does not eliminate risk, especially as attackers may develop exploits over time.
Mitigation Recommendations
Upgrade to a later, patched version of CGAL libcgal once available, as no patch is currently linked for version 5.1.1. Implement strict input validation and sanitization on all polygon files before processing, including rejecting malformed or suspicious files. Employ sandboxing or containerization for applications processing untrusted polygon data to limit potential damage from exploitation. Monitor application logs for unusual parsing errors or crashes that could indicate exploitation attempts. Restrict access to systems processing CGAL polygon files to trusted users and networks to reduce exposure. Conduct code audits and static analysis on custom software integrating libcgal to identify and remediate unsafe handling of polygon data. Where feasible, replace or supplement CGAL components with alternative libraries that have active maintenance and security support.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- talos
- Date Reserved
- 2020-11-13T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9842c4522896dcbf29fc
Added to database: 5/21/2025, 9:09:22 AM
Last enriched: 6/23/2025, 1:05:06 PM
Last updated: 7/30/2025, 2:11:08 AM
Views: 10
Related Threats
CVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-9024: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9023: Buffer Overflow in Tenda AC7
HighCVE-2025-8905: CWE-94 Improper Control of Generation of Code ('Code Injection') in inpersttion Inpersttion For Theme
MediumCVE-2025-8720: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in morehawes Plugin README Parser
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.