Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34545: CWE-122: Heap-based Buffer Overflow in AcademySoftwareFoundation openexr

0
High
VulnerabilityCVE-2026-34545cvecve-2026-34545cwe-122cwe-190
Published: Wed Apr 01 2026 (04/01/2026, 20:51:45 UTC)
Source: CVE Database V5
Vendor/Project: AcademySoftwareFoundation
Product: openexr

Description

CVE-2026-34545 is a high-severity heap-based buffer overflow vulnerability in the AcademySoftwareFoundation's openexr library versions 3. 4. 0 to before 3. 4. 7. The flaw arises when processing crafted . exr image files using HTJ2K compression with a channel width of 32768, allowing an attacker to write controlled data beyond the heap buffer. This overflow writes 2 or 4 bytes per iteration for each pixel past the overflow point, potentially enabling remote code execution in applications decoding these images. The vulnerability requires user interaction (opening a malicious file) but no authentication or privileges. It has been patched in version 3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 21:23:20 UTC

Technical Analysis

The vulnerability CVE-2026-34545 affects the openexr library, which implements the EXR image format widely used in the motion picture industry for high dynamic range images. Specifically, versions from 3.4.0 up to but not including 3.4.7 contain a heap-based buffer overflow triggered by processing specially crafted .exr files that use HTJ2K compression with an abnormally large channel width of 32768. The flaw allows an attacker to write beyond the allocated heap buffer by 2 bytes per overflow iteration or 4 bytes via an alternate code path, repeating for each pixel beyond the overflow boundary. This controlled heap overflow can corrupt memory and potentially lead to remote code execution when an application decodes such a malicious image. Exploitation requires the victim to open or process the crafted EXR file, but no prior authentication or elevated privileges are needed. The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow) and CWE-190 (Integer Overflow or Wraparound), indicating that improper handling of image metadata leads to unsafe memory writes. The issue was publicly disclosed on April 1, 2026, with a CVSS 4.0 base score of 8.4 (high severity), reflecting the significant impact on confidentiality, integrity, and availability, combined with relatively low attack complexity. The openexr project has released version 3.4.7 which patches this vulnerability. No active exploits have been reported in the wild yet, but the potential for remote code execution makes this a critical patch for affected users.

Potential Impact

This vulnerability poses a significant risk to organizations involved in media production, visual effects, and any industry relying on openexr for image processing. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary code with the privileges of the affected application. This could result in system compromise, data theft, or disruption of critical workflows. Since openexr is often integrated into larger software suites for rendering and image manipulation, the vulnerability could cascade, affecting multiple systems or pipelines. The requirement for user interaction (opening a malicious file) means social engineering or supply chain attacks could be vectors. Given the high severity and potential for full system compromise, organizations face risks to confidentiality, integrity, and availability of their systems and data. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits rapidly after disclosure.

Mitigation Recommendations

Organizations should immediately upgrade all instances of openexr to version 3.4.7 or later, where the vulnerability is patched. For environments where immediate upgrade is not feasible, implement strict file validation and scanning policies to detect and block suspicious or malformed EXR files, especially those with unusual channel widths or HTJ2K compression. Employ application whitelisting and sandboxing to limit the impact of potential exploitation. Educate users and staff to avoid opening EXR files from untrusted or unknown sources. Monitor security advisories from AcademySoftwareFoundation and related software vendors for updates or additional patches. Consider deploying runtime protections such as heap overflow detection and memory corruption mitigations (e.g., ASLR, DEP) to reduce exploitation likelihood. Review and harden the supply chain and ingestion points where EXR files are received or processed to prevent malicious files from entering the environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-30T16:31:39.264Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cd8944e6bfc5ba1dfc32f4

Added to database: 4/1/2026, 9:08:20 PM

Last enriched: 4/1/2026, 9:23:20 PM

Last updated: 4/1/2026, 10:17:38 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses