Firebird Server Denial-of-Service Vulnerability (CVE-2026-28224)
An unauthenticated attacker can trigger a denial-of-service condition on vulnerable Firebird servers by sending a specially crafted op_crypt_key_callback packet, leading to a null pointer dereference and server crash.
CVE-2026-28224 describes a denial-of-service vulnerability affecting Firebird, an open-source relational database management system. The vulnerability exists in versions prior to 5.0.4, 4.0.7, and 3.0.14. An unauthenticated attacker can exploit this vulnerability by sending a crafted op_crypt_key_callback packet to the server. When the server receives this packet without prior authentication, the port_server_crypt_callback handler is not initialized, resulting in a null pointer dereference. This leads to a server crash, effectively causing a denial-of-service condition. The attacker only needs to know the server’s IP address and port to trigger this vulnerability. The vulnerability has been patched in Firebird versions 5.0.4, 4.0.7 and 3.0.14.
Attack Chain
- The attacker identifies a vulnerable Firebird server by scanning for exposed ports (typically 3050).
- The attacker establishes a TCP connection with the targeted Firebird server on the identified port.
- The attacker crafts a malicious
op_crypt_key_callbackpacket. This packet does not require prior authentication. - The attacker sends the crafted
op_crypt_key_callbackpacket to the Firebird server. - Upon receiving the packet, the server attempts to process the request in the
port_server_crypt_callbackhandler. - Because no prior authentication has occurred, the
port_server_crypt_callbackhandler is not properly initialized, leading to a null pointer dereference. - The null pointer dereference causes the Firebird server process to crash.
- The Firebird database server becomes unavailable, resulting in a denial-of-service condition for legitimate users.
Impact
Successful exploitation of CVE-2026-28224 results in a denial-of-service condition, rendering the Firebird database server unavailable. This can disrupt applications and services that rely on the database, leading to data access issues, application downtime, and potential data loss if proper backup and recovery mechanisms are not in place. The number of affected organizations depends on the prevalence of vulnerable Firebird versions and their exposure to the network.
Recommendation
- Upgrade Firebird servers to versions 5.0.4, 4.0.7, or 3.0.14 or later to patch CVE-2026-28224.
- Deploy the Sigma rule “Detect Unauthenticated Firebird Crypt Callback” to your SIEM to identify potential exploitation attempts targeting this vulnerability.
- Implement network segmentation and access control lists (ACLs) to restrict access to Firebird servers from untrusted networks, mitigating the risk of unauthorized exploitation (network_connection logs).
- Monitor network traffic for suspicious
op_crypt_key_callbackpackets being sent to Firebird servers, particularly from untrusted sources (network_connection logs).
Detection coverage 2
Detect Unauthenticated Firebird Crypt Callback
highDetects attempts to exploit CVE-2026-28224 by identifying unauthenticated op_crypt_key_callback packets sent to Firebird servers.
Detect Firebird Server Crash
criticalDetects potential Firebird server crashes by monitoring for process termination events with specific exit codes indicative of a crash.
Detection queries are kept inside the platform. Get full rules →