Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34541: CWE-476: NULL Pointer Dereference in InternationalColorConsortium iccDEV

0
Medium
VulnerabilityCVE-2026-34541cvecve-2026-34541cwe-476
Published: Tue Mar 31 2026 (03/31/2026, 22:04:16 UTC)
Source: CVE Database V5
Vendor/Project: InternationalColorConsortium
Product: iccDEV

Description

CVE-2026-34541 is a medium severity vulnerability in iccDEV, a library for handling ICC color profiles. The flaw is a NULL pointer dereference in the CIccCombinedConnectionConditions constructor, triggered by a crafted ICC profile when using iccApplyNamedCmm with the -PCC option. This leads to undefined behavior and causes a denial of service by crashing the application. The vulnerability affects iccDEV versions prior to 2. 3. 1. 6 and requires no authentication or user interaction but local access to process malicious ICC files. No known exploits are reported in the wild, and the issue has been patched in version 2. 3. 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 22:23:33 UTC

Technical Analysis

CVE-2026-34541 is a vulnerability identified in the iccDEV project maintained by the InternationalColorConsortium, which provides libraries and tools for managing ICC color profiles. The issue is a NULL pointer dereference (CWE-476) occurring in the constructor of the CIccCombinedConnectionConditions class, specifically in the member call on a null pointer of type CIccTagSpectralViewingConditions. This flaw is triggered when processing a specially crafted ICC profile using the iccApplyNamedCmm tool with the -PCC flag. The undefined behavior caused by this dereference results in a crash of the application, effectively causing a denial of service (DoS). The vulnerability affects all versions of iccDEV prior to 2.3.1.6, where the issue has been fixed. The vulnerability requires local access to supply a malformed ICC profile to the tool, does not require privileges, nor user interaction, and does not expose confidentiality or integrity risks. The CVSS v3.1 base score is 6.2, reflecting the medium severity primarily due to the impact on availability and the low complexity of exploitation. No public exploits or active exploitation in the wild have been reported as of now. This vulnerability highlights the risks of processing untrusted ICC profiles in color management workflows and the importance of input validation and robust error handling in such libraries.

Potential Impact

The primary impact of CVE-2026-34541 is a denial of service condition caused by application crashes when processing malicious ICC profiles. This can disrupt image processing pipelines, printing workflows, or any system relying on iccDEV for color management, potentially halting operations temporarily. Since the vulnerability does not affect confidentiality or integrity, data leakage or unauthorized modification is not a concern. However, availability disruption can affect organizations that depend on automated color profile handling, such as print service providers, media companies, and graphic design firms. The ease of triggering the crash with crafted ICC files and no need for authentication increases the risk of accidental or intentional disruption. Although no exploits are known in the wild, the vulnerability could be leveraged in targeted attacks to interrupt critical color management processes. Systems that integrate iccDEV into larger software stacks may experience cascading failures if not properly isolated. Overall, the impact is moderate but significant for environments where uptime and reliability of color processing are critical.

Mitigation Recommendations

To mitigate CVE-2026-34541, organizations should immediately upgrade iccDEV to version 2.3.1.6 or later, where the NULL pointer dereference issue is patched. Additionally, implement strict validation and sanitization of all ICC profiles before processing, especially those obtained from untrusted or external sources. Employ sandboxing or containerization for applications using iccDEV to limit the impact of potential crashes. Monitor logs and application behavior for unexpected terminations related to ICC profile processing. Where possible, restrict the use of the iccApplyNamedCmm tool with the -PCC option to trusted users and environments. Incorporate fuzz testing and static analysis in the development lifecycle to detect similar memory safety issues proactively. Finally, maintain an inventory of systems using iccDEV to ensure timely patch deployment and reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-30T16:31:39.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cc45d1e6bfc5ba1d47e0f2

Added to database: 3/31/2026, 10:08:17 PM

Last enriched: 3/31/2026, 10:23:33 PM

Last updated: 3/31/2026, 11:19:14 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses