CVE-2025-4640: CWE-787 Out-of-bounds Write in PointCloudLibrary pcl
Out-of-bounds Write vulnerability in PointCloudLibrary pcl allows Overflow Buffers. Since version 1.14.0, PCL by default uses a zlib installation from the system, unless the user sets WITH_SYSTEM_ZLIB=FALSE. So this potential vulnerability is only relevant if the PCL version is older than 1.14.0 or the user specifically requests to not use the system zlib.
AI Analysis
Technical Summary
CVE-2025-4640 is a high-severity out-of-bounds write vulnerability (CWE-787) identified in the PointCloudLibrary (PCL), a widely used open-source library for 2D/3D image and point cloud processing. The vulnerability arises from improper handling of buffer boundaries, leading to potential overflow conditions. Specifically, this flaw can cause memory corruption by writing outside the allocated buffer limits. The vulnerability is relevant primarily to PCL versions older than 1.14.0 or configurations where the user disables the default use of the system-installed zlib (i.e., WITH_SYSTEM_ZLIB=FALSE). Since PCL 1.14.0 defaults to using the system zlib, which presumably mitigates this issue, newer versions are not affected unless explicitly configured otherwise. The CVSS 4.0 base score of 8.3 reflects a high severity with network attack vector but high attack complexity, no privileges or user interaction required, and significant impacts on availability and confidentiality, with limited impacts on integrity and other security properties. No known exploits are currently reported in the wild. The vulnerability could be exploited remotely by an unauthenticated attacker to cause buffer overflow, potentially leading to denial of service or arbitrary code execution depending on the exploitation context. Given PCL’s usage in robotics, autonomous vehicles, medical imaging, and industrial automation, exploitation could disrupt critical systems relying on point cloud data processing.
Potential Impact
For European organizations, the impact of CVE-2025-4640 could be significant in sectors relying on advanced 3D imaging and point cloud processing, such as automotive manufacturing, aerospace, robotics, healthcare imaging, and industrial automation. Disruption or compromise of systems using vulnerable PCL versions could lead to operational downtime, safety risks (especially in autonomous systems), and potential data breaches involving sensitive imaging data. Given the high CVSS score and the possibility of remote exploitation without authentication, attackers could leverage this vulnerability to execute denial of service attacks or potentially gain code execution capabilities on affected systems. This could impact critical infrastructure and industrial control systems in Europe, leading to economic losses and safety hazards. The absence of known exploits currently provides a window for proactive mitigation, but the vulnerability’s presence in foundational libraries used across multiple industries elevates the risk profile for European organizations.
Mitigation Recommendations
European organizations should prioritize upgrading to PCL version 1.14.0 or later, ensuring the default system zlib is used to mitigate this vulnerability. For environments where upgrading is not immediately feasible, verify that the build configuration does not disable system zlib (i.e., WITH_SYSTEM_ZLIB should not be set to FALSE). Conduct thorough inventory and software bill of materials (SBOM) analysis to identify all instances of PCL in use, especially in embedded and industrial systems where updates may lag. Implement network segmentation and strict access controls around systems processing point cloud data to reduce exposure to remote attacks. Employ runtime protections such as memory safety tools, address space layout randomization (ASLR), and control flow integrity (CFI) to limit exploitation impact. Monitor security advisories for patches or workarounds and apply them promptly once available. Additionally, perform targeted penetration testing and fuzzing on systems using PCL to detect any exploitation attempts or related vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden, Finland, Belgium
CVE-2025-4640: CWE-787 Out-of-bounds Write in PointCloudLibrary pcl
Description
Out-of-bounds Write vulnerability in PointCloudLibrary pcl allows Overflow Buffers. Since version 1.14.0, PCL by default uses a zlib installation from the system, unless the user sets WITH_SYSTEM_ZLIB=FALSE. So this potential vulnerability is only relevant if the PCL version is older than 1.14.0 or the user specifically requests to not use the system zlib.
AI-Powered Analysis
Technical Analysis
CVE-2025-4640 is a high-severity out-of-bounds write vulnerability (CWE-787) identified in the PointCloudLibrary (PCL), a widely used open-source library for 2D/3D image and point cloud processing. The vulnerability arises from improper handling of buffer boundaries, leading to potential overflow conditions. Specifically, this flaw can cause memory corruption by writing outside the allocated buffer limits. The vulnerability is relevant primarily to PCL versions older than 1.14.0 or configurations where the user disables the default use of the system-installed zlib (i.e., WITH_SYSTEM_ZLIB=FALSE). Since PCL 1.14.0 defaults to using the system zlib, which presumably mitigates this issue, newer versions are not affected unless explicitly configured otherwise. The CVSS 4.0 base score of 8.3 reflects a high severity with network attack vector but high attack complexity, no privileges or user interaction required, and significant impacts on availability and confidentiality, with limited impacts on integrity and other security properties. No known exploits are currently reported in the wild. The vulnerability could be exploited remotely by an unauthenticated attacker to cause buffer overflow, potentially leading to denial of service or arbitrary code execution depending on the exploitation context. Given PCL’s usage in robotics, autonomous vehicles, medical imaging, and industrial automation, exploitation could disrupt critical systems relying on point cloud data processing.
Potential Impact
For European organizations, the impact of CVE-2025-4640 could be significant in sectors relying on advanced 3D imaging and point cloud processing, such as automotive manufacturing, aerospace, robotics, healthcare imaging, and industrial automation. Disruption or compromise of systems using vulnerable PCL versions could lead to operational downtime, safety risks (especially in autonomous systems), and potential data breaches involving sensitive imaging data. Given the high CVSS score and the possibility of remote exploitation without authentication, attackers could leverage this vulnerability to execute denial of service attacks or potentially gain code execution capabilities on affected systems. This could impact critical infrastructure and industrial control systems in Europe, leading to economic losses and safety hazards. The absence of known exploits currently provides a window for proactive mitigation, but the vulnerability’s presence in foundational libraries used across multiple industries elevates the risk profile for European organizations.
Mitigation Recommendations
European organizations should prioritize upgrading to PCL version 1.14.0 or later, ensuring the default system zlib is used to mitigate this vulnerability. For environments where upgrading is not immediately feasible, verify that the build configuration does not disable system zlib (i.e., WITH_SYSTEM_ZLIB should not be set to FALSE). Conduct thorough inventory and software bill of materials (SBOM) analysis to identify all instances of PCL in use, especially in embedded and industrial systems where updates may lag. Implement network segmentation and strict access controls around systems processing point cloud data to reduce exposure to remote attacks. Employ runtime protections such as memory safety tools, address space layout randomization (ASLR), and control flow integrity (CFI) to limit exploitation impact. Monitor security advisories for patches or workarounds and apply them promptly once available. Additionally, perform targeted penetration testing and fuzzing on systems using PCL to detect any exploitation attempts or related vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GovTech CSG
- Date Reserved
- 2025-05-13T02:36:28.084Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec735
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 12:10:02 PM
Last updated: 8/12/2025, 11:03:09 PM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.