Skip to content
CVSS 7.1 · HIGH

CVE-2026-42476

Two heap-based out-of-bounds read vulnerabilities in the STL ASCII file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 exist in RWStl_Reader::ReadAscii because buffers returned by Standard_ReadLineBuffer::ReadLine() are not properly length-validated before strncasecmp or direct byte access. User-assisted attackers can trigger these issues by persuading a victim to open a crafted STL file with extremely short lines, resulting in a denial of service or possible information disclosure.

View on NVD

Analysis

This vulnerability affects a specialized C++ 3D modeling kernel used in CAD/CAM applications. It requires a user to open a maliciously crafted STL file and is unlikely to impact the general web, mobile, or backend developers in the community.

Severity

Score: 7.1(HIGH)
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
AV: LOCAL
AC: LOW
PR: NONE
UI: REQUIRED
S: UNCHANGED
C: HIGH
I: NONE
A: HIGH
Weakness (CWE): CWE-125

EPSS

Probability of exploitation (next 30 days): 0.0001 (0.0%)
Percentile: 1.8%
EPSS: 2026-05-06

Affects

opencascade:open_cascade_technology

Technical description

Two heap-based out-of-bounds read vulnerabilities in the STL ASCII file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 exist in RWStl_Reader::ReadAscii because buffers returned by Standard_ReadLineBuffer::ReadLine() are not properly length-validated before strncasecmp or direct byte access. User-assisted attackers can trigger these issues by persuading a victim to open a crafted STL file with extremely short lines, resulting in a denial of service or possible information disclosure.

Published: 5/1/2026, 3:16:43 PM
Last modified: 5/1/2026, 7:16:31 PM

References

HomeEventsBlogResourcesTeam