CVE-2024-48423
Python vulnerability analysis and mitigation

Overview

An issue in assimp v.5.4.3 was discovered that allows a local attacker to execute arbitrary code via the CallbackToLogRedirector function within the Assimp library. The vulnerability was identified and reported on September 20, 2024, and was assigned CVE-2024-48423 (MITRE, NVD).

Technical details

The vulnerability is classified as a heap-use-after-free (UAF) issue occurring in the CallbackToLogRedirector function in Assimp.cpp:359. The bug manifests when a previously freed memory region is accessed during the logging process, specifically when attempting to access a log stream after it has been freed. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD, GitHub Issue).

Impact

The vulnerability could lead to memory corruption due to the reuse of freed memory, potentially resulting in unexpected behavior, crashes, or arbitrary code execution in contexts that rely on Assimp for parsing and importing 3D models. The high CVSS score indicates significant potential impact on the confidentiality, integrity, and availability of affected systems (GitHub Issue).

Mitigation and workarounds

As of the current date, there is no official patch available for this vulnerability. The issue affects assimp version 5.4.3 and potentially earlier versions. Maintainers are advised to address this vulnerability by ensuring proper memory management, particularly by avoiding the use of memory after it has been freed and ensuring that log streams are properly detached before being accessed (Debian Security Tracker).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66645HIGH7.5
  • PythonPython
  • nicegui
NoYesDec 09, 2025
CVE-2025-66470MEDIUM6.1
  • PythonPython
  • nicegui
NoYesDec 09, 2025
CVE-2025-66469MEDIUM6.1
  • PythonPython
  • nicegui
NoYesDec 09, 2025
CVE-2025-67502MEDIUM5.4
  • PythonPython
  • taguette
NoYesDec 09, 2025
CVE-2025-67485MEDIUM5.3
  • PythonPython
  • mad-proxy
NoNoDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management