The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-59733

CVE-2025-59733: OpenEXR Buffer Overflow Vulnerability

CVE-2025-59733 is a buffer overflow flaw in OpenEXR's DWAA/DWAB compression handling that occurs when channels have mismatched pixel types. This article covers the technical details, affected versions, and mitigation.

Published: April 15, 2026

CVE-2025-59733 Overview

CVE-2025-59733 is a high-severity out-of-bounds write vulnerability affecting OpenEXR file processing when decoding files that use DWAA or DWAB compression. The vulnerability stems from implicit assumptions in the decompression code regarding channel pixel types and ordering, which can be exploited to write beyond allocated buffer boundaries.

When decoding an OpenEXR file that uses DWAA or DWAB compression, the code makes an implicit assumption that all image channels have the same pixel type (and size), and that if there are four channels, the first four are "B", "G", "R" and "A". An attacker can craft a malicious OpenEXR file that violates these assumptions, leading to memory corruption.

Critical Impact

Successful exploitation of this vulnerability could allow an attacker to corrupt memory beyond allocated buffers, potentially leading to code execution or application crashes when processing malicious OpenEXR files.

Affected Products

  • OpenEXR versions prior to 8.0
  • Software and libraries utilizing OpenEXR DWAA/DWAB decompression functionality

Discovery Timeline

  • 2025-10-06 - CVE CVE-2025-59733 published to NVD
  • 2025-10-19 - Last updated in NVD database

Technical Details for CVE-2025-59733

Vulnerability Analysis

This vulnerability is classified as CWE-787 (Out-of-Bounds Write), a memory corruption flaw that occurs during the decompression of specially crafted OpenEXR files. The attack requires adjacent network access and some user interaction, such as opening a malicious file.

The core issue lies in the dwa_uncompress function's handling of channel data. The buffer td->uncompressed_data is allocated in decode_block based on xsize, ysize, and a computed current_channel_offset. However, the decompression logic assumes uniform channel types without proper validation.

When the main color channels are set to a 4-byte type while additional duplicate or unknown channels use the 2-byte EXR_HALF type, the pointer arithmetic incorrectly increments by 4 bytes × xsize × nb_channels, causing the write operation to exceed the allocated buffer boundaries.

Root Cause

The root cause is an implicit assumption in the channel parsing and decompression code that all image channels share the same pixel type and size. The decode_header function parses channel information, but the dwa_uncompress function fails to validate that the actual channel types match the expected uniform type before performing pointer arithmetic and memory operations.

Specifically, if there are four channels, the code assumes these are "B", "G", "R", and "A" without verification. The calculations for buffer offset advancement use a fixed channel type size based on the main color channels, regardless of the actual types of additional channels present in the file.

Attack Vector

The attack requires an adversary with adjacent network access to deliver a malicious OpenEXR file to the target system. User interaction is required, typically involving opening or processing the crafted file through an application that utilizes the vulnerable OpenEXR library.

The attacker constructs an OpenEXR file with DWAA or DWAB compression containing:

  • Main color channels configured with a 4-byte pixel type
  • Additional duplicate or unknown channels using the 2-byte EXR_HALF type

When the vulnerable library processes this file, the mismatch between assumed and actual channel sizes causes the decompression routine to write data beyond the allocated buffer, resulting in heap memory corruption. For technical details, see the Google Issue Tracker Entry.

Detection Methods for CVE-2025-59733

Indicators of Compromise

  • Unexpected application crashes when processing OpenEXR image files
  • Memory access violation errors in image processing applications
  • OpenEXR files with unusual channel configurations containing mixed pixel types
  • Abnormal memory allocation patterns during OpenEXR file parsing

Detection Strategies

  • Monitor for crashes in applications using OpenEXR libraries with DWAA/DWAB compression
  • Implement file validation to detect OpenEXR files with inconsistent channel pixel types
  • Deploy memory corruption detection tools to identify out-of-bounds write attempts
  • Review application logs for memory allocation failures during image processing operations

Monitoring Recommendations

  • Enable heap corruption detection mechanisms in development and testing environments
  • Implement input validation for OpenEXR files before processing
  • Monitor for unusual file access patterns involving OpenEXR files from untrusted sources
  • Deploy endpoint detection capabilities to identify exploitation attempts targeting image processing components

How to Mitigate CVE-2025-59733

Immediate Actions Required

  • Upgrade to OpenEXR version 8.0 or later which addresses this vulnerability
  • Restrict processing of OpenEXR files from untrusted sources
  • Implement application sandboxing for image processing workflows
  • Enable memory protection mechanisms such as ASLR and DEP where supported

Patch Information

The vendor recommends upgrading to OpenEXR version 8.0 or beyond to remediate this vulnerability. The fix properly validates channel pixel types during DWAA/DWAB decompression to ensure consistent handling and prevent buffer overflows.

For additional information, refer to the Google Issue Tracker Entry.

Workarounds

  • Disable DWAA and DWAB compression support if not required for business operations
  • Implement strict input validation to reject OpenEXR files with mismatched channel types
  • Process OpenEXR files in isolated sandbox environments to limit potential impact
  • Use alternative compression methods for OpenEXR files until patching is complete

Organizations should prioritize applying the official patch as workarounds may not provide complete protection against all exploitation scenarios.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechOpenexr

  • SeverityHIGH

  • CVSS Score8.7

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityHigh
  • AvailabilityNone
  • CWE References
  • CWE-787
  • Technical References
  • Google Issue Tracker Entry
  • Related CVEs
  • CVE-2026-42217: OpenEXR Buffer Overflow Vulnerability

  • CVE-2026-42216: OpenEXR Buffer Overflow Vulnerability

  • CVE-2026-41142: OpenEXR Buffer Overflow Vulnerability

  • CVE-2026-40250: OpenEXR Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English