EUVD-2026-12534

| CVE-2026-0708 HIGH
2026-03-17 fedora
8.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 17, 2026 - 08:13 vuln.today
EUVD ID Assigned
Mar 17, 2026 - 08:13 euvd
EUVD-2026-12534
CVE Published
Mar 17, 2026 - 02:28 nvd
HIGH 8.3

Description

A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the `ucl_object_emit` function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system.

Analysis

Denial of service in libucl allows remote attackers to crash affected applications by submitting maliciously crafted UCL configuration files containing null bytes in object keys, triggering a segmentation fault in the ucl_object_emit function. The vulnerability requires user interaction but has high impact potential with no available patch, affecting systems that parse untrusted UCL input. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all systems and applications using libucl through asset inventory and dependency scanning; assess exposure by determining if untrusted UCL input is processed. Within 7 days: Implement network segmentation to restrict UCL input sources and deploy input validation rules; disable UCL parsing features if non-critical. …

Sign in for detailed remediation steps.

Priority Score

42
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +42
POC: 0

Vendor Status

Share

EUVD-2026-12534 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy