CVE-2026-28691

7.5 HIGH

📋 TL;DR

An uninitialized pointer dereference vulnerability in ImageMagick's JBIG decoder allows attackers to cause denial of service or potentially execute arbitrary code by processing malicious JBIG images. This affects all systems running vulnerable versions of ImageMagick that process untrusted JBIG files. The vulnerability is present in ImageMagick versions prior to 7.1.2-16 and 6.9.13-41.

💻 Affected Systems

Products:
  • ImageMagick
Versions: All versions prior to 7.1.2-16 and 6.9.13-41
Operating Systems: All operating systems running vulnerable ImageMagick versions
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable when processing JBIG format images. Applications using ImageMagick libraries or command-line tools to process untrusted JBIG files are at risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise if the uninitialized pointer can be controlled to execute arbitrary code.

🟠

Likely Case

Application crash or denial of service when processing malicious JBIG images, potentially disrupting image processing services.

🟢

If Mitigated

Limited impact with proper input validation and sandboxing, potentially only causing application crashes.

🌐 Internet-Facing: MEDIUM - Exploitable if the application processes user-uploaded JBIG images, but requires specific image format processing.
🏢 Internal Only: LOW - Requires processing of malicious JBIG files, which is less common in internal-only systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious JBIG images. No public exploit code is currently available, but the vulnerability is relatively straightforward to trigger.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.1.2-16 and 6.9.13-41

Vendor Advisory: https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-wj8w-pjxf-9g4f

Restart Required: Yes

Instructions:

1. Update ImageMagick to version 7.1.2-16 or 6.9.13-41 using your package manager. 2. For Linux: 'sudo apt update && sudo apt upgrade imagemagick' or 'sudo yum update imagemagick'. 3. For source installations: Download and compile from the official repository. 4. Restart any services using ImageMagick.

🔧 Temporary Workarounds

Disable JBIG decoder

linux

Remove or disable JBIG format support in ImageMagick configuration

Edit /etc/ImageMagick-6/policy.xml or /etc/ImageMagick-7/policy.xml and add: <policy domain="coder" rights="none" pattern="JBIG" />

Input validation

all

Reject or sanitize JBIG files before processing with ImageMagick

🧯 If You Can't Patch

  • Implement strict input validation to reject JBIG files from untrusted sources
  • Run ImageMagick in a sandboxed environment with limited privileges

🔍 How to Verify

Check if Vulnerable:

Check ImageMagick version with 'convert --version' or 'magick --version' and compare against vulnerable versions

Check Version:

convert --version | head -1 || magick --version | head -1

Verify Fix Applied:

Verify version is 7.1.2-16 or higher, or 6.9.13-41 or higher. Test with known safe JBIG images to ensure processing works.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or segmentation faults when processing JBIG files
  • Error messages related to JBIG decoder failures

Network Indicators:

  • Unusual uploads of JBIG format files to web applications
  • Spikes in image processing requests

SIEM Query:

source="*imagemagick*" AND (error OR crash OR segfault) AND JBIG

🔗 References

📤 Share & Export