CVE-2026-40025

The Sleuth Kit through 4.14.0 contains an out-of-bounds read vulnerability in the APFS filesystem keybag parser where the wrapped_key_parser class follows attacker-controlled length fields without bounds checking, causing heap reads past the allocated buffer. An attacker can craft a malicious APFS disk image that triggers information disclosure or crashes when processed by any Sleuth Kit tool that parses APFS volumes.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sleuthkit:the_sleuth_kit:*:*:*:*:*:*:*:*

History

13 Apr 2026, 20:28

Type Values Removed Values Added
CPE cpe:2.3:a:sleuthkit:the_sleuth_kit:*:*:*:*:*:*:*:*
First Time Sleuthkit
Sleuthkit the Sleuth Kit
References () https://github.com/sleuthkit/sleuthkit/commit/8b9c9e7d493bd68624f3b1a3963edd45c3ff7611 - () https://github.com/sleuthkit/sleuthkit/commit/8b9c9e7d493bd68624f3b1a3963edd45c3ff7611 - Patch
References () https://github.com/sleuthkit/sleuthkit/pull/3444 - () https://github.com/sleuthkit/sleuthkit/pull/3444 - Issue Tracking
References () https://mobasi.ai/sentinel - () https://mobasi.ai/sentinel - Third Party Advisory
References () https://www.vulncheck.com/advisories/sleuth-kit-apfs-keybag-parser-out-of-bounds-read - () https://www.vulncheck.com/advisories/sleuth-kit-apfs-keybag-parser-out-of-bounds-read - Third Party Advisory

08 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-08 22:16

Updated : 2026-04-15 20:52


NVD link : CVE-2026-40025

Mitre link : CVE-2026-40025

CVE.ORG link : CVE-2026-40025


JSON object : View

Products Affected

sleuthkit

  • the_sleuth_kit
CWE
CWE-125

Out-of-bounds Read