CVE-2026-5342

| EUVD-2026-18344 MEDIUM
2026-04-02 VulDB GHSA-jp35-q64r-j6gf
5.5
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

5
PoC Detected
Apr 07, 2026 - 12:16 vuln.today
Public exploit code
Analysis Generated
Apr 02, 2026 - 15:00 vuln.today
EUVD ID Assigned
Apr 02, 2026 - 15:00 euvd
EUVD-2026-18344
Patch Released
Apr 02, 2026 - 15:00 nvd
Patch available
CVE Published
Apr 02, 2026 - 14:30 nvd
MEDIUM 5.5

Description

A flaw has been found in LibRaw up to 0.22.0. This affects the function LibRaw::nikon_load_padded_packed_raw of the file src/decoders/decoders_libraw.cpp of the component TIFF/NEF. Executing a manipulation of the argument load_flags/raw_width can lead to out-of-bounds read. It is possible to launch the attack remotely. The exploit has been published and may be used. Upgrading to version 0.22.1 mitigates this issue. This patch is called b8397cd45657b84e88bd1202528d1764265f185c. It is advisable to upgrade the affected component.

Analysis

Out-of-bounds read in LibRaw up to 0.22.0 allows remote unauthenticated attackers to cause denial of service via manipulation of load_flags or raw_width parameters in the TIFF/NEF decoder (nikon_load_padded_packed_raw function). Publicly available exploit code exists, and vendor-released patch version 0.22.1 is available. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Priority Score

48
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +28
POC: +20

Share

CVE-2026-5342 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy