The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-9900

CVE-2025-9900: Libtiff RCE Vulnerability

CVE-2025-9900 is a remote code execution flaw in Libtiff caused by a write-what-where condition when processing crafted TIFF files. Attackers can exploit memory corruption to crash applications or execute code.

Published: March 11, 2026

CVE-2025-9900 Overview

A critical memory corruption vulnerability has been identified in LibTiff, the widely-used TIFF image processing library. This vulnerability is classified as a "write-what-where" condition (CWE-123), which occurs when the library processes a specially crafted TIFF image file.

By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user running the vulnerable application.

Critical Impact

Attackers can achieve arbitrary code execution or cause denial of service by tricking users or applications into processing maliciously crafted TIFF images. The vulnerability requires user interaction but can be exploited remotely via network-delivered images.

Affected Products

  • LibTiff versions prior to 4.7.1
  • Applications and services that depend on LibTiff for TIFF image processing
  • Linux distributions using vulnerable LibTiff packages (Red Hat, Debian, and others)

Discovery Timeline

  • September 23, 2025 - CVE-2025-9900 published to NVD
  • February 27, 2026 - Last updated in NVD database

Technical Details for CVE-2025-9900

Vulnerability Analysis

This vulnerability represents a classic write-what-where memory corruption condition, which is among the most dangerous classes of memory safety vulnerabilities. When LibTiff parses TIFF image metadata, it reads the image height value from the file header without adequate validation. By crafting a TIFF file with an abnormally large height value, an attacker can manipulate the library's internal memory calculations.

The core issue lies in how the library calculates memory offsets for writing pixel color data during image processing. When the height value exceeds expected bounds, the calculated write offset can point to arbitrary memory locations outside the intended image buffer. The attacker-controlled color data from the malicious TIFF file is then written to this arbitrary location, resulting in controlled memory corruption.

This type of vulnerability is particularly severe because it provides attackers with precise control over both the memory location being written to and the data being written. This level of control enables sophisticated exploitation techniques including overwriting function pointers, corrupting critical data structures, or hijacking program execution flow.

Root Cause

The root cause of CVE-2025-9900 is insufficient validation of the image height field within TIFF file metadata before it is used in memory address calculations. The library trusts the height value provided in the image header without verifying that it falls within safe bounds, leading to integer overflow or miscalculation of buffer offsets during the pixel data processing phase.

This missing bounds check allows attackers to influence memory write operations by manipulating a single metadata field in a crafted TIFF file. The fix, addressed in GitLab Merge Request #732, adds proper validation of image dimensions before they are used in critical memory operations.

Attack Vector

The attack vector for this vulnerability is network-based but requires user interaction. An attacker must convince a user or automated system to open or process a maliciously crafted TIFF image file. Common attack scenarios include:

  1. Email attachments - Delivering malicious TIFF files via email to targets
  2. Web-based delivery - Hosting malicious images on websites or embedding them in web content
  3. Document embedding - Including crafted TIFF images in documents processed by applications using LibTiff
  4. Automated processing pipelines - Targeting image processing services that automatically handle uploaded images

Upon successful exploitation, the attacker can achieve code execution with the same privileges as the application processing the malicious image. If the vulnerable application runs with elevated privileges or as a system service, the impact can extend to full system compromise.

The vulnerability mechanism involves crafting a TIFF file with manipulated header values that cause the library to miscalculate memory offsets during image processing. Technical details and a proof-of-concept demonstrating the write-what-where condition are available in the GitHub PoC repository and the GitLab Issue #704.

Detection Methods for CVE-2025-9900

Indicators of Compromise

  • Presence of TIFF files with abnormally large image height values in file metadata
  • Unexpected application crashes when processing TIFF images, particularly segmentation faults
  • Memory access violations in applications using LibTiff for image processing
  • Suspicious TIFF files with height values exceeding practical image dimensions (e.g., values approaching integer limits)

Detection Strategies

  • Monitor for LibTiff-related crash dumps and core files indicating memory corruption during TIFF processing
  • Implement file inspection rules to flag TIFF files with suspicious metadata values before processing
  • Use endpoint detection to identify exploitation attempts through behavioral analysis of image processing applications
  • Deploy YARA rules targeting TIFF file structures with anomalous dimension values in headers

Monitoring Recommendations

  • Enable detailed logging for applications that process user-supplied or external TIFF images
  • Monitor system logs for repeated crashes or restarts of image processing services
  • Implement file integrity monitoring on directories where TIFF files are commonly stored or processed
  • Track network traffic for unusual TIFF file downloads from untrusted sources

How to Mitigate CVE-2025-9900

Immediate Actions Required

  • Update LibTiff to version 4.7.1 or later, which contains the security fix for this vulnerability
  • Review and update all applications that bundle or statically link LibTiff to incorporate the patched version
  • Apply available security updates from your Linux distribution (Red Hat, Debian, etc.)
  • Temporarily restrict processing of TIFF files from untrusted sources if immediate patching is not possible

Patch Information

The vulnerability has been addressed in LibTiff version 4.7.1. The fix adds proper validation of image dimension metadata before use in memory calculations, preventing the write-what-where condition from being triggered.

Multiple Linux distributions have released security advisories and patches addressing this vulnerability. Key resources include:

  • LibTiff Release Notes v4.7.1 - Official release containing the fix
  • Red Hat CVE Report - Red Hat's assessment and patch guidance
  • Red Hat Security Advisory RHSA-2025:17651 and related advisories
  • Debian LTS Announcement - Debian security update information
  • Red Hat Bug Report #2392784 - Bug tracking details

Workarounds

  • Implement input validation at the application level to reject TIFF files with suspicious metadata before passing them to LibTiff
  • Use sandboxing or containerization to isolate image processing operations from critical system resources
  • Disable or restrict TIFF image processing functionality in applications where it is not strictly required
  • Configure web application firewalls to inspect and potentially block TIFF file uploads with anomalous characteristics
bash
# Check installed LibTiff version on Linux systems
rpm -qa | grep libtiff    # For RHEL/CentOS/Fedora
dpkg -l | grep libtiff    # For Debian/Ubuntu

# Update LibTiff on RHEL-based systems
sudo yum update libtiff

# Update LibTiff on Debian-based systems
sudo apt-get update && sudo apt-get upgrade libtiff5

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechLibtiff

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-123
  • Technical References
  • Red Hat Security Advisory RHSA-2025:17651

  • Red Hat Security Advisory RHSA-2025:17675

  • Red Hat Security Advisory RHSA-2025:17710

  • Red Hat Security Advisory RHSA-2025:17738

  • Red Hat Security Advisory RHSA-2025:17739

  • Red Hat Security Advisory RHSA-2025:17740

  • Red Hat Security Advisory RHSA-2025:19113

  • Red Hat Security Advisory RHSA-2025:19156

  • Red Hat Security Advisory RHSA-2025:19276

  • Red Hat Security Advisory RHSA-2025:19906

  • Red Hat Security Advisory RHSA-2025:19947

  • Red Hat Security Advisory RHSA-2025:20956

  • Red Hat Security Advisory RHSA-2025:20998

  • Red Hat Security Advisory RHSA-2025:21060

  • Red Hat Security Advisory RHSA-2025:21061

  • Red Hat Security Advisory RHSA-2025:21062

  • Red Hat Security Advisory RHSA-2025:21407

  • Red Hat Security Advisory RHSA-2025:21506

  • Red Hat Security Advisory RHSA-2025:21507

  • Red Hat Security Advisory RHSA-2025:21508

  • Red Hat Security Advisory RHSA-2025:21994

  • Red Hat Security Advisory RHSA-2025:23078

  • Red Hat Security Advisory RHSA-2025:23079

  • Red Hat Security Advisory RHSA-2025:23080

  • Red Hat Security Advisory RHSA-2026:0001

  • Red Hat Security Advisory RHSA-2026:0076

  • Red Hat Security Advisory RHSA-2026:0077

  • Red Hat Security Advisory RHSA-2026:0078

  • Red Hat Security Advisory RHSA-2026:3461

  • Red Hat Security Advisory RHSA-2026:3462

  • Red Hat CVE Report CVE-2025-9900

  • Red Hat Bug Report #2392784

  • GitHub PoC for LibTiff Vulnerability

  • GitLab Issue #704 for LibTiff

  • GitLab Merge Request #732 for LibTiff

  • LibTiff Release Notes v4.7.1

  • OpenWall OSS-Security Mailing List

  • Debian LTS Announcement
  • Related CVEs
  • CVE-2026-4775: libtiff Library RCE Vulnerability

  • CVE-2023-41175: Libtiff RCE Vulnerability

  • CVE-2023-40745: LibTIFF Integer Overflow RCE Vulnerability

  • CVE-2020-35523: Libtiff Integer Overflow RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English