Armis Logo< Back

CVE-2016-3714:

CVE-2016-3714 (ImageTragick) — ImageMagick remote code execution via crafted images containing shell metacharacters; affects 6.9.3-9 and 7.0.0-0, fixed in 6.9.3-10 and 7.0.1-1.


Score
Info
A numerical rating that indicates how dangerous this vulnerability is.

8.4High
  • Published Date:May 5, 2016
  • CISA KEV Date:Sep 9, 2024
  • Industries Affected:20
Armis Early Warning:
Early Warning3049 Days

Threat Predictions

  • EPSS Score:93.8
  • EPSS Percentile:100%

Exploitability

  • Score:2.5
  • Attack Vector:LOCAL
  • Attack Complexity:LOW
  • Privileges Required:NONE
  • User Interaction:NONE
  • Scope:UNCHANGED

Impact

  • Score:5.9
  • Confidentiality Impact:HIGH
  • Integrity Impact:HIGH
  • Availability Impact:HIGH

Description Preview

CVE-2016-3714 (ImageTragick) — ImageMagick remote code execution via crafted images containing shell metacharacters; affects 6.9.3-9 and 7.0.0-0, fixed in 6.9.3-10 and 7.0.1-1.

Overview

ImageMagick contains a remote code execution vulnerability (ImageTragick) due to certain coders (EPHEMERAL, HTTPS, MVG, MSL, TEXT, SHOW, WIN, PLT) processing shell metacharacters in crafted images. When such an image is handled by vulnerable versions, an attacker can run arbitrary commands on the affected system. The flaw affects 6.9.3-9 and 7.0.0 through 7.0.1-0, with fixes released in 6.9.3-10 and 7.0.1-1. This vulnerability prompted multiple vendor advisories and security discussions, emphasizing the need to upgrade to patched releases and apply mitigations.

Remediation

  • Upgrade ImageMagick to the patched releases: 6.9.3-10 or newer for the 6.x line, and 7.0.1-1 or newer for the 7.x line. Apply these upgrades across all affected systems (Red Hat, Debian, Ubuntu, SUSE, etc.).
  • If upgrading is not immediately possible:
  • Apply vendor advisories and security patches from your OS vendor (e.g., Red Hat, Debian, Ubuntu, SUSE) and follow their containment guidance.
  • Run ImageMagick with the least-privilege user account and, where feasible, in isolated containers or sandboxes to limit impact.
  • Use policy restrictions to limit or disable dangerous features and coders in ImageMagick’s policy.xml, and restrict processing of untrusted images where possible.
  • Validate and sanitize all image inputs in applications, and monitor for indicators of exploitation (unusual processes, logs, or spikes in resource usage).
  • After applying fixes or mitigations, test in a staging environment to confirm normal image processing behavior and verify that the vulnerability is no longer exploitable.

References

Early WarningArmis Early Warning

Armis Early Warning provides proactive threat intelligence and early detection capabilities.Click here to learn more.

  • Armis Alert Date:Apr 28, 2016
  • CISA KEV Date:Sep 9, 2024
  • Days Early:3049 Days

Industries Affected

Below is a list of industries most commonly impacted or potentially at risk based on intelligence.

Low
Mining icon
Mining
Utilities icon
Utilities
Information icon
Information
Construction icon
Construction
Retail Trade icon
Retail Trade
Manufacturing icon
Manufacturing
Wholesale Trade icon
Wholesale Trade
Educational Services icon
Educational Services
Finance and Insurance icon
Finance and Insurance
Public Administration icon
Public Administration
Real Estate Rental and Leasing icon
Real Estate Rental and Leasing
Transportation and Warehousing icon
Transportation and Warehousing
Accommodation and Food Services icon
Accommodation and Food Services
Health Care and Social Assistance icon
Health Care and Social Assistance
Arts, Entertainment, and Recreation icon
Arts, Entertainment, and Recreation
Management of Companies and Enterprises icon
Management of Companies and Enterprises
Agriculture, Forestry, Fishing and Hunting icon
Agriculture, Forestry, Fishing and Hunting
Other Services (except Public Administration) icon
Other Services (except Public Administration)
Professional, Scientific, and Technical Services icon
Professional, Scientific, and Technical Services
Administrative and Support and Waste Management and Remediation Services icon
Administrative and Support and Waste Management and Remediation Services

Focus on What Matters

See everything.Identify true risk.Proactively mitigate threats.Book a Demo

Let's talk!