← Voltar para CVEs
CVE-2026-23750
HIGH8.1
Descricao
Golioth Pouch version 0.1.0, prior to commit 1b2219a1, contains a heap-based buffer overflow in BLE GATT server certificate handling. server_cert_write() allocates a heap buffer of size CONFIG_POUCH_SERVER_CERT_MAX_LEN when receiving the first fragment, then appends subsequent fragments using memcpy() without verifying that sufficient capacity remains. An adjacent BLE client can send unauthenticated fragments whose combined size exceeds the allocated buffer, causing a heap overflow and crash; integrity impact is also possible due to memory corruption.
Detalhes CVE
Pontuacao CVSS v3.18.1
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Vetor de ataqueADJACENT_NETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado2/26/2026
Ultima modificacao2/27/2026
Fontenvd
Avistamentos honeypot0
Fraquezas (CWE)
CWE-122
Referencias
https://blog.secmate.dev/posts/golioth-vulnerabilities-disclosure/(disclosure@vulncheck.com)
https://github.com/golioth/pouch/commit/1b2219a1(disclosure@vulncheck.com)
https://secmate.dev/disclosures/SECMATE-2025-0018(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/golioth-pouch-ble-gatt-heap-based-buffer-overflow(disclosure@vulncheck.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.