Skip to main content

CVE-2025-52937: Vulnerability in PointCloudLibrary pcl

Low
VulnerabilityCVE-2025-52937cvecve-2025-52937
Published: Mon Jun 23 2025 (06/23/2025, 09:26:12 UTC)
Source: CVE Database V5
Vendor/Project: PointCloudLibrary
Product: pcl

Description

Vulnerability in PointCloudLibrary PCL (surface/src/3rdparty/opennurbs modules). This vulnerability is associated with program files crc32.C. This vulnerability is only relevant if the PCL version is older than 1.14.0 or the user specifically requests to not use the system zlib (WITH_SYSTEM_ZLIB=FALSE).

AI-Powered Analysis

AILast updated: 06/23/2025, 10:05:47 UTC

Technical Analysis

CVE-2025-52937 is a vulnerability identified in the PointCloudLibrary (PCL), specifically within the surface/src/3rdparty/opennurbs modules related to the crc32.C program files. The vulnerability affects versions of PCL older than 1.14.0 or configurations where the system zlib compression library is not used (i.e., WITH_SYSTEM_ZLIB=FALSE). PCL is an open-source library widely used for 2D/3D image and point cloud processing, often leveraged in robotics, computer vision, and 3D modeling applications. The vulnerability is characterized by a low CVSS 4.0 score of 2, indicating limited impact and exploitability. The vector details (AV:L/AC:H/AT:P/PR:L/UI:N) suggest that exploitation requires local access with high attack complexity, partial privileges, and partial user interaction is not required. The impact on confidentiality, integrity, and availability is low, with limited scope and no requirement for user interaction. No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability likely involves improper handling or calculation of CRC32 checksums in the affected modules, which could lead to minor data integrity issues or denial of service under specific conditions. Given the dependency on older versions or specific build configurations, the threat surface is limited to legacy or custom-built environments that do not use the system zlib library.

Potential Impact

For European organizations, the impact of CVE-2025-52937 is expected to be minimal due to the low severity and limited exploitability. Organizations using up-to-date versions of PCL (1.14.0 or later) or those that rely on the system zlib library are not affected. However, entities in sectors such as robotics, autonomous vehicles, manufacturing, and 3D modeling that use legacy PCL versions or custom builds without system zlib could face minor risks. Potential impacts include localized denial of service or minor data integrity issues in point cloud processing workflows, which could disrupt operational processes or degrade the quality of 3D data analysis. Since exploitation requires local access and partial privileges, remote attacks are unlikely, reducing the risk of widespread compromise. Overall, the threat does not pose a critical risk to confidentiality or availability of sensitive data but could affect system reliability in niche applications.

Mitigation Recommendations

European organizations should audit their use of the PointCloudLibrary to identify any instances of versions older than 1.14.0 or builds configured with WITH_SYSTEM_ZLIB=FALSE. Immediate mitigation involves upgrading to PCL version 1.14.0 or later, which addresses the vulnerability. For environments where upgrading is not feasible, recompiling PCL with system zlib enabled is recommended to mitigate the vulnerability. Additionally, restricting local access to systems running vulnerable PCL versions and enforcing strict privilege separation can reduce the risk of exploitation. Organizations should also monitor internal systems for unusual behavior related to point cloud processing tasks and implement integrity checks on critical data processed by PCL modules. Since no patches are currently linked, maintaining close contact with the PCL project for updates and applying patches promptly upon release is essential. Finally, incorporating this vulnerability into vulnerability management and asset inventory systems will ensure ongoing awareness and timely remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GovTech CSG
Date Reserved
2025-06-23T09:24:36.336Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68592327179a4edd60b65f48

Added to database: 6/23/2025, 9:49:27 AM

Last enriched: 6/23/2025, 10:05:47 AM

Last updated: 8/15/2025, 8:01:39 PM

Views: 40

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats