CVE-2025-5200: Out-of-Bounds Read in Open Asset Import Library Assimp
A vulnerability was found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This issue affects the function MDLImporter::InternReadFile_Quake1 of the file assimp/code/AssetLib/MDL/MDLLoader.cpp. The manipulation leads to out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.
AI Analysis
Technical Summary
CVE-2025-5200 is a medium severity vulnerability identified in version 5.4.3 of the Open Asset Import Library (Assimp), specifically within the MDLImporter::InternReadFile_Quake1 function located in the MDLLoader.cpp source file. The vulnerability is an out-of-bounds read, which occurs when the function improperly handles data while parsing Quake 1 MDL model files. This flaw allows an attacker with local access and low privileges to trigger a read operation beyond the allocated memory bounds. Although the vulnerability does not directly enable code execution or privilege escalation, out-of-bounds reads can lead to information disclosure, application crashes, or undefined behavior. The vulnerability requires local access and low privileges, does not require user interaction, and does not affect confidentiality, integrity, or availability at a high level. The vulnerability was publicly disclosed on May 26, 2025, and while no known exploits are currently in the wild, the disclosure and availability of exploit details increase the risk of exploitation. The project maintainers have indicated plans to address this and other fuzzer-discovered bugs collectively in future updates, but no immediate patch or mitigation has been released at the time of disclosure.
Potential Impact
For European organizations, the impact of CVE-2025-5200 is primarily related to the use of Assimp 5.4.3 in local environments where MDL Quake 1 model files are processed. Organizations involved in 3D modeling, game development, CAD, or digital content creation that rely on Assimp for asset importation may be affected. The out-of-bounds read could lead to application instability or crashes, potentially disrupting workflows or causing denial of service in local applications. While the vulnerability does not directly allow remote exploitation or privilege escalation, the local nature of the attack vector limits its impact to users or processes with access to the affected system. However, in environments where multiple users share workstations or where untrusted model files are processed, there is a risk of information leakage or application disruption. European organizations with strict data protection regulations should consider the risk of potential data exposure through memory disclosure. Overall, the threat is moderate but should be addressed to maintain operational stability and security hygiene.
Mitigation Recommendations
To mitigate CVE-2025-5200, European organizations should: 1) Immediately audit their use of Assimp 5.4.3 and identify systems where the library is used to process MDL Quake 1 files. 2) Restrict local access to systems running vulnerable versions of Assimp to trusted users only, minimizing the risk of exploitation by unprivileged users. 3) Implement input validation and sanitization controls to ensure that only trusted and verified model files are processed, reducing exposure to crafted malicious files. 4) Monitor application logs and system behavior for crashes or anomalies related to asset import operations. 5) Engage with the Assimp project or vendor to track the release of patches addressing this and related fuzzer-discovered vulnerabilities and plan timely updates. 6) Consider sandboxing or isolating applications that process untrusted model files to contain potential crashes or information leaks. 7) Educate developers and users about the risks of processing untrusted 3D assets and enforce secure handling policies.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy
CVE-2025-5200: Out-of-Bounds Read in Open Asset Import Library Assimp
Description
A vulnerability was found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This issue affects the function MDLImporter::InternReadFile_Quake1 of the file assimp/code/AssetLib/MDL/MDLLoader.cpp. The manipulation leads to out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.
AI-Powered Analysis
Technical Analysis
CVE-2025-5200 is a medium severity vulnerability identified in version 5.4.3 of the Open Asset Import Library (Assimp), specifically within the MDLImporter::InternReadFile_Quake1 function located in the MDLLoader.cpp source file. The vulnerability is an out-of-bounds read, which occurs when the function improperly handles data while parsing Quake 1 MDL model files. This flaw allows an attacker with local access and low privileges to trigger a read operation beyond the allocated memory bounds. Although the vulnerability does not directly enable code execution or privilege escalation, out-of-bounds reads can lead to information disclosure, application crashes, or undefined behavior. The vulnerability requires local access and low privileges, does not require user interaction, and does not affect confidentiality, integrity, or availability at a high level. The vulnerability was publicly disclosed on May 26, 2025, and while no known exploits are currently in the wild, the disclosure and availability of exploit details increase the risk of exploitation. The project maintainers have indicated plans to address this and other fuzzer-discovered bugs collectively in future updates, but no immediate patch or mitigation has been released at the time of disclosure.
Potential Impact
For European organizations, the impact of CVE-2025-5200 is primarily related to the use of Assimp 5.4.3 in local environments where MDL Quake 1 model files are processed. Organizations involved in 3D modeling, game development, CAD, or digital content creation that rely on Assimp for asset importation may be affected. The out-of-bounds read could lead to application instability or crashes, potentially disrupting workflows or causing denial of service in local applications. While the vulnerability does not directly allow remote exploitation or privilege escalation, the local nature of the attack vector limits its impact to users or processes with access to the affected system. However, in environments where multiple users share workstations or where untrusted model files are processed, there is a risk of information leakage or application disruption. European organizations with strict data protection regulations should consider the risk of potential data exposure through memory disclosure. Overall, the threat is moderate but should be addressed to maintain operational stability and security hygiene.
Mitigation Recommendations
To mitigate CVE-2025-5200, European organizations should: 1) Immediately audit their use of Assimp 5.4.3 and identify systems where the library is used to process MDL Quake 1 files. 2) Restrict local access to systems running vulnerable versions of Assimp to trusted users only, minimizing the risk of exploitation by unprivileged users. 3) Implement input validation and sanitization controls to ensure that only trusted and verified model files are processed, reducing exposure to crafted malicious files. 4) Monitor application logs and system behavior for crashes or anomalies related to asset import operations. 5) Engage with the Assimp project or vendor to track the release of patches addressing this and related fuzzer-discovered vulnerabilities and plan timely updates. 6) Consider sandboxing or isolating applications that process untrusted model files to contain potential crashes or information leaks. 7) Educate developers and users about the risks of processing untrusted 3D assets and enforce secure handling policies.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-26T13:03:25.838Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6835ae14182aa0cae20fa19b
Added to database: 5/27/2025, 12:20:36 PM
Last enriched: 7/11/2025, 10:16:57 AM
Last updated: 8/18/2025, 11:33:42 PM
Views: 14
Related Threats
CVE-2025-52451: CWE-20 Improper Input Validation in Salesforce Tableau Server
UnknownCVE-2025-52450: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Salesforce Tableau Server
UnknownCVE-2025-26498: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server
UnknownCVE-2025-26497: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server
UnknownCVE-2025-26496: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Salesforce Tableau Server, Tableau Desktop
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.