The Sleuth Kit through 4.14.0 contains an out-of-bounds read vulnerability in the APFS filesystem keybag parser where the wrapped_key_parser class follows attacker-controlled length fields without bounds checking, causing heap reads past the allocated buffer. An attacker can craft a malicious APFS disk image that triggers information disclosure or crashes when processed by any Sleuth Kit tool that parses APFS volumes.
References
| Link | Resource |
|---|---|
| https://github.com/sleuthkit/sleuthkit/commit/8b9c9e7d493bd68624f3b1a3963edd45c3ff7611 | Patch |
| https://github.com/sleuthkit/sleuthkit/pull/3444 | Issue Tracking |
| https://mobasi.ai/sentinel | Third Party Advisory |
| https://www.vulncheck.com/advisories/sleuth-kit-apfs-keybag-parser-out-of-bounds-read | Third Party Advisory |
Configurations
History
13 Apr 2026, 20:28
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:sleuthkit:the_sleuth_kit:*:*:*:*:*:*:*:* | |
| First Time |
Sleuthkit
Sleuthkit the Sleuth Kit |
|
| References | () https://github.com/sleuthkit/sleuthkit/commit/8b9c9e7d493bd68624f3b1a3963edd45c3ff7611 - Patch | |
| References | () https://github.com/sleuthkit/sleuthkit/pull/3444 - Issue Tracking | |
| References | () https://mobasi.ai/sentinel - Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/sleuth-kit-apfs-keybag-parser-out-of-bounds-read - Third Party Advisory |
08 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-08 22:16
Updated : 2026-04-15 20:52
NVD link : CVE-2026-40025
Mitre link : CVE-2026-40025
CVE.ORG link : CVE-2026-40025
JSON object : View
Products Affected
sleuthkit
- the_sleuth_kit
CWE
CWE-125
Out-of-bounds Read
