Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30980: CWE-121: Stack-based Buffer Overflow in InternationalColorConsortium iccDEV

0
Medium
VulnerabilityCVE-2026-30980cvecve-2026-30980cwe-121cwe-400cwe-674
Published: Tue Mar 10 2026 (03/10/2026, 18:07:26 UTC)
Source: CVE Database V5
Vendor/Project: InternationalColorConsortium
Product: iccDEV

Description

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack overflow in CIccBasicStructFactory::CreateStruct() causing uncontrolled recursion/stack exhaustion and crash. This vulnerability is fixed in 2.3.1.5.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:25:01 UTC

Technical Analysis

The vulnerability identified as CVE-2026-30980 affects the iccDEV library, a set of tools and libraries used for handling ICC color management profiles, which are critical in color calibration and management workflows across various software and hardware platforms. The flaw is a stack-based buffer overflow caused by uncontrolled recursion within the CIccBasicStructFactory::CreateStruct() function. Specifically, when processing certain malformed or crafted ICC profiles, the function recursively calls itself without proper termination, leading to stack exhaustion and ultimately causing the application to crash. This behavior results in a denial-of-service condition, impacting the availability of applications relying on iccDEV. The vulnerability requires local access and user interaction to trigger, with no privileges required, limiting remote exploitation potential. The CVSS v3.1 base score is 5.5 (medium), reflecting the local attack vector, low complexity, no privileges required, but user interaction needed, and impact limited to availability (no confidentiality or integrity loss). The issue is resolved in iccDEV version 2.3.1.5, and users are advised to upgrade to this or later versions. No public exploits have been reported, and the vulnerability was reserved and published in early March 2026. The associated CWEs include CWE-121 (stack-based buffer overflow), CWE-400 (uncontrolled resource consumption), and CWE-674 (uncontrolled recursion).

Potential Impact

The primary impact of CVE-2026-30980 is denial of service due to application crashes caused by stack exhaustion. This can disrupt workflows in environments that rely on iccDEV for ICC profile processing, such as digital imaging, printing, and media production. While the vulnerability does not compromise confidentiality or integrity, repeated crashes could degrade system stability and availability, potentially interrupting critical color management operations. Organizations with automated pipelines or services that process ICC profiles might experience service interruptions or require manual intervention to recover. Since exploitation requires local access and user interaction, remote attacks are unlikely, reducing the threat surface. However, insider threats or compromised endpoints could leverage this flaw to disrupt services. The absence of known exploits in the wild suggests limited immediate risk, but the vulnerability should be addressed proactively to avoid future exploitation as awareness grows.

Mitigation Recommendations

To mitigate CVE-2026-30980, organizations should upgrade iccDEV to version 2.3.1.5 or later, where the vulnerability is fixed. If immediate upgrade is not feasible, restrict local access to systems running vulnerable versions and limit user permissions to reduce the risk of exploitation. Implement input validation and sanitization for ICC profiles before processing to detect and block malformed or suspicious profiles that could trigger uncontrolled recursion. Employ application-level monitoring to detect crashes or abnormal behavior related to ICC profile handling. Additionally, consider sandboxing or isolating processes that utilize iccDEV to contain potential denial-of-service impacts. Regularly audit and update third-party libraries like iccDEV as part of software supply chain security practices. Educate users about the risks of opening untrusted ICC profiles and enforce strict policies on profile sources.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-07T17:53:48.817Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b060169972381a9898e690

Added to database: 3/10/2026, 6:16:54 PM

Last enriched: 3/10/2026, 6:25:01 PM

Last updated: 3/13/2026, 10:23:32 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses