CVE-2026-0849

Malformed ATAES132A responses with an oversized length field overflow a 52-byte stack buffer in the Zephyr crypto driver, allowing a compromised device or bus attacker to corrupt kernel memory and potentially hijack execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:zephyrproject:zephyr:4.3.0:-:*:*:*:*:*:*
cpe:2.3:o:zephyrproject:zephyr:4.3.0:rc1:*:*:*:*:*:*
cpe:2.3:o:zephyrproject:zephyr:4.3.0:rc2:*:*:*:*:*:*
cpe:2.3:o:zephyrproject:zephyr:4.3.0:rc3:*:*:*:*:*:*

History

02 Apr 2026, 14:26

Type Values Removed Values Added
References () https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-ff4p-3ggg-prp6 - () https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-ff4p-3ggg-prp6 - Exploit, Patch, Vendor Advisory
Summary
  • (es) Respuestas ATAES132A malformadas con un campo de longitud sobredimensionado desbordan un búfer de pila de 52 bytes en el controlador criptográfico de Zephyr, permitiendo a un dispositivo comprometido o a un atacante del bus corromper la memoria del kernel y potencialmente secuestrar la ejecución.
CPE cpe:2.3:o:zephyrproject:zephyr:4.3.0:rc2:*:*:*:*:*:*
cpe:2.3:o:zephyrproject:zephyr:4.3.0:-:*:*:*:*:*:*
cpe:2.3:o:zephyrproject:zephyr:4.3.0:rc1:*:*:*:*:*:*
cpe:2.3:o:zephyrproject:zephyr:4.3.0:rc3:*:*:*:*:*:*
First Time Zephyrproject
Zephyrproject zephyr

17 Mar 2026, 16:16

Type Values Removed Values Added
References () https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-ff4p-3ggg-prp6 - () https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-ff4p-3ggg-prp6 -

16 Mar 2026, 14:18

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-16 14:18

Updated : 2026-04-02 14:26


NVD link : CVE-2026-0849

Mitre link : CVE-2026-0849

CVE.ORG link : CVE-2026-0849


JSON object : View

Products Affected

zephyrproject

  • zephyr
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')