Gnupg

3 CVEs product

Monthly

CVE-2026-24882 HIGH POC PATCH This Week

Stack-based buffer overflow in GnuPG's tpm2daemon component allows local attackers to achieve full system compromise through specially crafted PKDECRYPT commands targeting TPM-backed RSA and ECC keys. Public exploit code exists for this vulnerability, which affects GnuPG versions before 2.5.17 and impacts users of GnuPG, Gpg4win, and Stack Overflow integrations. No patch is currently available, leaving systems vulnerable to local privilege escalation and arbitrary code execution.

Buffer Overflow Stack Overflow Gpg4win Gnupg Redhat +1
NVD
CVSS 3.1
8.4
EPSS
0.0%
CVE-2026-24881 HIGH POC PATCH This Week

GnuPG's gpg-agent fails to properly validate session key sizes in S/MIME messages, allowing remote attackers to trigger a stack buffer overflow via oversized CMS EnvelopedData payloads. Public exploit code exists for this vulnerability, which affects GnuPG versions before 2.5.17 and can be weaponized for denial of service or potentially remote code execution. No patch is currently available.

RCE Buffer Overflow Stack Overflow Memory Corruption Denial Of Service +4
NVD
CVSS 3.1
8.1
EPSS
0.2%
CVE-2025-30258 LOW POC Monitor

In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify. Rated low severity (CVSS 2.7), this vulnerability is no authentication required. Public exploit code available and no vendor patch available.

Information Disclosure Gnupg
NVD
CVSS 3.1
2.7
EPSS
0.0%
CVE-2026-24882
EPSS 0% CVSS 8.4
HIGH POC PATCH This Week

Stack-based buffer overflow in GnuPG's tpm2daemon component allows local attackers to achieve full system compromise through specially crafted PKDECRYPT commands targeting TPM-backed RSA and ECC keys. Public exploit code exists for this vulnerability, which affects GnuPG versions before 2.5.17 and impacts users of GnuPG, Gpg4win, and Stack Overflow integrations. No patch is currently available, leaving systems vulnerable to local privilege escalation and arbitrary code execution.

Buffer Overflow Stack Overflow Gpg4win +3
NVD
CVE-2026-24881
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

GnuPG's gpg-agent fails to properly validate session key sizes in S/MIME messages, allowing remote attackers to trigger a stack buffer overflow via oversized CMS EnvelopedData payloads. Public exploit code exists for this vulnerability, which affects GnuPG versions before 2.5.17 and can be weaponized for denial of service or potentially remote code execution. No patch is currently available.

RCE Buffer Overflow Stack Overflow +6
NVD
CVE-2025-30258
EPSS 0% CVSS 2.7
LOW POC Monitor

In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify. Rated low severity (CVSS 2.7), this vulnerability is no authentication required. Public exploit code available and no vendor patch available.

Information Disclosure Gnupg
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy