CVE-2026-1678

CRITICAL
2026-03-05 [email protected]
9.4
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 22:06 vuln.today
PoC Detected
Mar 09, 2026 - 18:33 vuln.today
Public exploit code
CVE Published
Mar 05, 2026 - 07:16 nvd
CRITICAL 9.4

Description

dns_unpack_name() caches the buffer tailroom once and reuses it while appending DNS labels. As the buffer grows, the cached size becomes incorrect, and the final null terminator can be written past the buffer. With assertions disabled (default), a malicious DNS response can trigger an out-of-bounds write when CONFIG_DNS_RESOLVER is enabled.

Analysis

Buffer overflow in Zephyr RTOS dns_unpack_name() function causing OOB writes. PoC available.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify and inventory all systems running affected DNS software; isolate critical DNS servers from untrusted networks where possible. Within 7 days: Implement network segmentation to restrict DNS query sources, deploy DNS query rate limiting, and enable DNS request logging for threat detection. …

Sign in for detailed remediation steps.

Priority Score

67
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +47
POC: +20

Share

CVE-2026-1678 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy