← Retour aux CVEs
CVE-2026-23750
HIGH8.1
Description
Golioth Pouch version 0.1.0, prior to commit 1b2219a1, contains a heap-based buffer overflow in BLE GATT server certificate handling. server_cert_write() allocates a heap buffer of size CONFIG_POUCH_SERVER_CERT_MAX_LEN when receiving the first fragment, then appends subsequent fragments using memcpy() without verifying that sufficient capacity remains. An adjacent BLE client can send unauthenticated fragments whose combined size exceeds the allocated buffer, causing a heap overflow and crash; integrity impact is also possible due to memory corruption.
Details CVE
Score CVSS v3.18.1
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Vecteur d'attaqueADJACENT_NETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie2/26/2026
Derniere modification2/27/2026
Sourcenvd
Observations honeypot0
Faiblesses (CWE)
CWE-122
References
https://blog.secmate.dev/posts/golioth-vulnerabilities-disclosure/(disclosure@vulncheck.com)
https://github.com/golioth/pouch/commit/1b2219a1(disclosure@vulncheck.com)
https://secmate.dev/disclosures/SECMATE-2025-0018(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/golioth-pouch-ble-gatt-heap-based-buffer-overflow(disclosure@vulncheck.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.