EUVD-2026-23640

| CVE-2026-40572 CRITICAL
2026-04-18 GitHub_M
9.0
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

4
patch_available
Apr 18, 2026 - 02:01 EUVD
Analysis Updated
Apr 18, 2026 - 01:27 vuln.today
v2 (cvss_changed)
Re-analysis Queued
Apr 18, 2026 - 01:22 vuln.today
cvss_changed
Analysis Generated
Apr 18, 2026 - 01:09 vuln.today

DescriptionNVD

NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 15 (MemoryMapRange) allows Ring 3 user-mode processes to map arbitrary virtual address ranges into their address space without validating against forbidden regions, including critical kernel structures such as the IDT, GDT, TSS, and page tables. A local attacker can exploit this to modify kernel interrupt handlers, resulting in privilege escalation from user mode to kernel context. This issue has been fixed in version 0.24.

AnalysisAI

Local privilege escalation in NovumOS <0.24 allows unprivileged processes to overwrite kernel interrupt handlers through unchecked memory mapping. Syscall 15 (MemoryMapRange) fails to validate user-requested virtual address ranges against protected kernel regions (IDT, GDT, TSS, page tables), enabling ring 3 to ring 0 escalation. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all systems running NovumOS <0.24 and isolate from production networks or restrict local access. Within 7 days: Test NovumOS v0.24 or later in staging environment for compatibility. …

Sign in for detailed remediation steps.

Share

EUVD-2026-23640 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy