libexif Vulnerability Allows Code Execution and Denial-of-Service
Summary
CERT-Bund has issued a security advisory regarding a vulnerability in the libexif library (versions <=0.6.25). The vulnerability allows local attackers to execute arbitrary code, cause a denial-of-service, or disclose confidential information. Mitigation is available.
What changed
CERT-Bund has released security advisory WID-SEC-2026-0739 detailing a critical vulnerability in the libexif library, affecting versions up to and including 0.6.25. This vulnerability, with a CVSS Base Score of 7.4, can be exploited by a local attacker to achieve arbitrary code execution, induce a denial-of-service state, or potentially reveal sensitive information. The advisory indicates that mitigation measures are available.
Organizations utilizing libexif, particularly those running UNIX-based systems or other systems that incorporate this library for EXIF data processing, should assess their exposure. While the advisory notes that remote attacks are not possible, the potential for local code execution and denial-of-service necessitates prompt review and application of available mitigations or updates to prevent exploitation. Affected parties should consult the advisory for specific mitigation steps and version information.
What to do next
- Review systems for use of libexif versions <=0.6.25
- Implement available mitigation measures as per CERT-Bund advisory
- Update libexif to a patched version once available
Source document (simplified)
[WID-SEC-2026-0739] libexif: Schwachstelle ermöglicht Codeausführung CVSS Base Score 7.4 (hoch) CVSS Temporal Score 6.7 (mittel) Remoteangriff nein Datum 16.03.2026 Stand 17.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Sonstiges
- UNIX
Produktbeschreibung
Libexif ist eine Bibliothek, die für die Verarbeitung und Speicherung von Exchangeable Image File Format (EXIF) Daten verwendet wird.
Produkte
16.03.2026
- Open Source libexif <=0.6.25
Angriff
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in libexif ausnutzen, um potenziell beliebigen Code auszuführen, einen Denial-of-Service-Zustand herbeizuführen oder vertrauliche Informationen offenzulegen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.