Skip to main content

CVE-2025-4640: CWE-787 Out-of-bounds Write in PointCloudLibrary pcl

High
VulnerabilityCVE-2025-4640cvecve-2025-4640cwe-787
Published: Wed May 14 2025 (05/14/2025, 18:06:51 UTC)
Source: CVE
Vendor/Project: PointCloudLibrary
Product: pcl

Description

Out-of-bounds Write vulnerability in PointCloudLibrary pcl allows Overflow Buffers. Since version 1.14.0, PCL by default uses a zlib installation from the system, unless the user sets WITH_SYSTEM_ZLIB=FALSE. So this potential vulnerability is only relevant if the PCL version is older than 1.14.0 or the user specifically requests to not use the system zlib.

AI-Powered Analysis

AILast updated: 07/06/2025, 12:10:02 UTC

Technical Analysis

CVE-2025-4640 is a high-severity out-of-bounds write vulnerability (CWE-787) identified in the PointCloudLibrary (PCL), a widely used open-source library for 2D/3D image and point cloud processing. The vulnerability arises from improper handling of buffer boundaries, leading to potential overflow conditions. Specifically, this flaw can cause memory corruption by writing outside the allocated buffer limits. The vulnerability is relevant primarily to PCL versions older than 1.14.0 or configurations where the user disables the default use of the system-installed zlib (i.e., WITH_SYSTEM_ZLIB=FALSE). Since PCL 1.14.0 defaults to using the system zlib, which presumably mitigates this issue, newer versions are not affected unless explicitly configured otherwise. The CVSS 4.0 base score of 8.3 reflects a high severity with network attack vector but high attack complexity, no privileges or user interaction required, and significant impacts on availability and confidentiality, with limited impacts on integrity and other security properties. No known exploits are currently reported in the wild. The vulnerability could be exploited remotely by an unauthenticated attacker to cause buffer overflow, potentially leading to denial of service or arbitrary code execution depending on the exploitation context. Given PCL’s usage in robotics, autonomous vehicles, medical imaging, and industrial automation, exploitation could disrupt critical systems relying on point cloud data processing.

Potential Impact

For European organizations, the impact of CVE-2025-4640 could be significant in sectors relying on advanced 3D imaging and point cloud processing, such as automotive manufacturing, aerospace, robotics, healthcare imaging, and industrial automation. Disruption or compromise of systems using vulnerable PCL versions could lead to operational downtime, safety risks (especially in autonomous systems), and potential data breaches involving sensitive imaging data. Given the high CVSS score and the possibility of remote exploitation without authentication, attackers could leverage this vulnerability to execute denial of service attacks or potentially gain code execution capabilities on affected systems. This could impact critical infrastructure and industrial control systems in Europe, leading to economic losses and safety hazards. The absence of known exploits currently provides a window for proactive mitigation, but the vulnerability’s presence in foundational libraries used across multiple industries elevates the risk profile for European organizations.

Mitigation Recommendations

European organizations should prioritize upgrading to PCL version 1.14.0 or later, ensuring the default system zlib is used to mitigate this vulnerability. For environments where upgrading is not immediately feasible, verify that the build configuration does not disable system zlib (i.e., WITH_SYSTEM_ZLIB should not be set to FALSE). Conduct thorough inventory and software bill of materials (SBOM) analysis to identify all instances of PCL in use, especially in embedded and industrial systems where updates may lag. Implement network segmentation and strict access controls around systems processing point cloud data to reduce exposure to remote attacks. Employ runtime protections such as memory safety tools, address space layout randomization (ASLR), and control flow integrity (CFI) to limit exploitation impact. Monitor security advisories for patches or workarounds and apply them promptly once available. Additionally, perform targeted penetration testing and fuzzing on systems using PCL to detect any exploitation attempts or related vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GovTech CSG
Date Reserved
2025-05-13T02:36:28.084Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec735

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 12:10:02 PM

Last updated: 8/12/2025, 11:03:09 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats