The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-1622

CVE-2022-1622: Libtiff Out-of-Bounds Read DOS Vulnerability

CVE-2022-1622 is an out-of-bounds read flaw in Libtiff that enables attackers to trigger denial-of-service through malicious TIFF files. This article covers the technical details, affected versions, impact, and mitigation.

Published: February 11, 2026

CVE-2022-1622 Overview

CVE-2022-1622 is an out-of-bounds read vulnerability affecting the LibTIFF library, specifically in the LZWDecode function located in libtiff/tif_lzw.c at line 619. This memory safety issue allows attackers to cause a denial-of-service condition by crafting a malicious TIFF file that triggers improper memory access during image decompression.

LibTIFF is a widely-used open-source library for reading and writing TIFF (Tagged Image File Format) images, integrated into numerous operating systems and applications including Apple's iOS, macOS, tvOS, and watchOS platforms. The widespread adoption of LibTIFF across multiple vendors amplifies the potential impact of this vulnerability.

Critical Impact

Attackers can crash applications processing TIFF images, leading to denial of service across systems using LibTIFF including Apple devices, Fedora Linux, and NetApp storage systems.

Affected Products

  • LibTIFF version 4.3.0 and master branch
  • Fedora 35 and Fedora 36
  • Apple iOS, macOS, tvOS, and watchOS (multiple versions)
  • NetApp ONTAP Select Deploy Administration Utility

Discovery Timeline

  • May 11, 2022 - CVE-2022-1622 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2022-1622

Vulnerability Analysis

The vulnerability exists within the LZW (Lempel-Ziv-Welch) decompression routine of LibTIFF. When processing a specially crafted TIFF file, the LZWDecode function fails to properly validate memory boundaries before performing read operations. This out-of-bounds read occurs because the decompression algorithm does not adequately verify that the data being accessed falls within allocated buffer limits.

The flaw is classified as CWE-125 (Out-of-bounds Read), indicating that the software reads data past the end or before the beginning of the intended buffer. While out-of-bounds reads typically do not allow code execution, they can expose sensitive memory contents or cause application crashes when accessing protected memory regions.

The local attack vector requires user interaction—specifically, a victim must open a malicious TIFF file with an application using the vulnerable LibTIFF library. This makes social engineering or drive-by download scenarios viable attack paths.

Root Cause

The root cause stems from insufficient bounds checking in the LZWDecode function within tif_lzw.c. During LZW decompression, the function processes compressed data streams without adequately validating that read operations stay within the bounds of the input buffer. When a malformed TIFF file contains corrupted or intentionally crafted LZW-compressed data, the decoder may attempt to read memory locations beyond the allocated buffer boundaries.

The fix implemented in commit b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a adds proper boundary validation to prevent the out-of-bounds memory access during the decompression process.

Attack Vector

The attack requires local access and user interaction. An attacker must convince a user to open a maliciously crafted TIFF file using an application that relies on the vulnerable LibTIFF library for image processing. Common attack scenarios include:

The vulnerability is triggered when the LZWDecode function processes a specially crafted TIFF file containing malformed LZW-compressed image data. The malicious file causes the decoder to read beyond allocated buffer boundaries, resulting in either a crash (denial of service) or potential information disclosure from adjacent memory regions.

Given the widespread use of LibTIFF across Apple operating systems and various Linux distributions, attack surfaces include email attachments, web downloads, messaging applications, and any software that processes TIFF images.

Detection Methods for CVE-2022-1622

Indicators of Compromise

  • Unexpected application crashes when processing TIFF image files
  • Abnormal memory access patterns in applications using LibTIFF
  • Core dumps or crash reports indicating faults in tif_lzw.c or related LibTIFF components
  • Unusual TIFF files with malformed LZW compression headers

Detection Strategies

  • Monitor system logs for repeated crashes in image processing applications
  • Implement file integrity monitoring for TIFF files entering the environment
  • Deploy endpoint detection rules targeting abnormal LibTIFF library behavior
  • Use static analysis tools to identify vulnerable LibTIFF versions in deployed software

Monitoring Recommendations

  • Enable crash reporting and analyze crash dumps for patterns indicating exploitation attempts
  • Monitor network traffic for suspicious TIFF file transfers, particularly from untrusted sources
  • Track software inventory to identify systems running vulnerable LibTIFF versions
  • Implement sandbox environments for processing untrusted image files

How to Mitigate CVE-2022-1622

Immediate Actions Required

  • Update LibTIFF to a patched version incorporating commit b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
  • Apply operating system updates from Apple (see HT213443, HT213444, HT213446)
  • Update Fedora systems via official package updates (see Fedora Package Announcements)
  • Review the NetApp Security Advisory for ONTAP Select Deploy Administration Utility updates

Patch Information

For users compiling LibTIFF from sources, the fix is available in commit b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a. The patch can be obtained from the official LibTIFF GitLab repository.

Apple has released security updates addressing this vulnerability across multiple platforms:

  • iOS and iPadOS: See Apple Support Document HT213486
  • macOS: See Apple Support Document HT213443 and HT213488
  • tvOS: See Apple Support Document HT213487
  • watchOS: See Apple Support Document HT213444

Fedora users should update via standard package management to receive the patched LibTIFF packages.

Workarounds

  • Restrict TIFF file processing to trusted sources only until patches can be applied
  • Implement application sandboxing to limit the impact of potential crashes
  • Use alternative image formats (PNG, JPEG) where LZW-compressed TIFF processing is not required
  • Deploy web application firewalls or email filters to block suspicious TIFF file uploads
bash
# For users compiling LibTIFF from source, apply the fix:
git clone https://gitlab.com/libtiff/libtiff.git
cd libtiff
git checkout b4e79bfa0c7d2d08f6f1e7ec38143fc8cb11394a
./autogen.sh
./configure
make && make install

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechLibtiff

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.10%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-125
  • Technical References
  • Full Disclosure Post #28

  • Full Disclosure Post #39

  • Full Disclosure Post #41

  • GitLab CVE-2022-1622 Details

  • GitLab libtiff Issue #410

  • Fedora Package Announcement #1

  • Fedora Package Announcement #2

  • NetApp Security Advisory NTAP-20220616-0005

  • Apple Support Document HT213443

  • Apple Support Document HT213444

  • Apple Support Document HT213446

  • Apple Support Document HT213486

  • Apple Support Document HT213487

  • Apple Support Document HT213488
  • Vendor Resources
  • GitLab libtiff Commit Update
  • Related CVEs
  • CVE-2023-52356: Libtiff Denial of Service Vulnerability

  • CVE-2023-52355: Libtiff DOS Vulnerability

  • CVE-2024-7006: Libtiff Null Pointer Dereference DOS Flaw

  • CVE-2023-0800: Libtiff Out-of-Bounds Write DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English