<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Out-of-Bounds Read — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/out-of-bounds-read/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 21 Apr 2026 17:16:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/out-of-bounds-read/feed.xml" rel="self" type="application/rss+xml"/><item><title>NVIDIA CUDA-Q Out-of-Bounds Read Vulnerability (CVE-2026-24189)</title><link>https://feed.craftedsignal.io/briefs/2026-04-cuda-q-oob-read/</link><pubDate>Tue, 21 Apr 2026 17:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cuda-q-oob-read/</guid><description>NVIDIA CUDA-Q is vulnerable to an out-of-bounds read via a maliciously crafted request to an endpoint, potentially leading to denial of service and information disclosure as tracked by CVE-2026-24189.</description><content:encoded><![CDATA[<p>NVIDIA CUDA-Q contains a vulnerability identified as CVE-2026-24189 that allows an unauthenticated attacker to trigger an out-of-bounds read. This vulnerability exists in an unspecified endpoint of the CUDA-Q software. By sending a maliciously crafted request, an attacker can potentially read sensitive information from memory or cause a denial-of-service condition. This vulnerability has a CVSS v3.1 score of 8.2, indicating a high severity. Successful exploitation can lead to both information disclosure and service disruption, impacting the confidentiality and availability of systems running vulnerable versions of CUDA-Q. This is particularly concerning for systems processing sensitive data or providing critical services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable CUDA-Q endpoint exposed over the network.</li>
<li>The attacker crafts a malicious request designed to trigger an out-of-bounds read. This likely involves manipulating request parameters to access memory outside of the intended buffer.</li>
<li>The attacker sends the malicious request to the vulnerable CUDA-Q endpoint.</li>
<li>The CUDA-Q software processes the request without proper bounds checking.</li>
<li>The software attempts to read memory outside of the allocated buffer, triggering an out-of-bounds read condition.</li>
<li>If the out-of-bounds read is successful, the attacker gains access to sensitive information stored in memory.</li>
<li>The attacker may cause a denial-of-service condition by triggering a crash or unexpected behavior due to the memory access violation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-24189 can lead to a denial of service, rendering the CUDA-Q service unavailable. Additionally, the out-of-bounds read can expose sensitive information stored in memory, potentially leading to further compromise. The severity of the impact depends on the nature of the data accessible via the out-of-bounds read. Sectors relying on CUDA-Q for computationally intensive tasks are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests targeting CUDA-Q endpoints to detect potential exploitation attempts (category: webserver, product: linux).</li>
<li>Apply any available patches or updates from NVIDIA to address the CVE-2026-24189 vulnerability.</li>
<li>Deploy the Sigma rule to detect suspicious HTTP requests (rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-24189</category><category>out-of-bounds read</category><category>nvidia</category></item><item><title>Microsoft Excel Out-of-Bounds Read Vulnerability (CVE-2026-32188)</title><link>https://feed.craftedsignal.io/briefs/2026-04-excel-oob-read/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-excel-oob-read/</guid><description>An out-of-bounds read vulnerability in Microsoft Office Excel (CVE-2026-32188) allows a local attacker to potentially disclose sensitive information through a maliciously crafted Excel file.</description><content:encoded><![CDATA[<p>CVE-2026-32188 describes an out-of-bounds read vulnerability affecting Microsoft Office Excel. According to the NVD, this vulnerability allows an unauthorized attacker to disclose information locally. The CVSS v3.1 score is 7.1, indicating a high severity. The vulnerability resides within how Excel parses certain file formats, potentially allowing a malicious actor to craft a file that, when opened, causes Excel to read memory outside of allocated buffers. This can lead to the disclosure of sensitive information contained in the application&rsquo;s memory space. While the source doesn&rsquo;t specify affected versions or a specific attack campaign, successful exploitation requires user interaction to open the malicious file. Defenders should focus on detecting abnormal process behavior in Excel and promptly applying available patches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Excel file designed to trigger the out-of-bounds read vulnerability (CVE-2026-32188).</li>
<li>The attacker delivers the crafted Excel file to a victim via social engineering or other means.</li>
<li>The victim opens the malicious Excel file.</li>
<li>Excel attempts to parse the malformed data structures within the file.</li>
<li>Due to the vulnerability, Excel reads memory outside the intended buffer boundaries.</li>
<li>The out-of-bounds read results in the disclosure of sensitive information from Excel&rsquo;s memory.</li>
<li>The attacker retrieves the disclosed information, potentially containing sensitive data or internal application state.</li>
<li>The attacker uses the disclosed information for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32188 can lead to the disclosure of sensitive information from the victim&rsquo;s system. While the vulnerability is local, the disclosed information could include credentials, internal network details, or other sensitive data that could be used for further attacks. The number of potential victims is broad, encompassing any user of Microsoft Office Excel. The impact could range from minor data leaks to more significant compromises depending on the nature of the disclosed information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to patch CVE-2026-32188 on all affected systems. Reference the Microsoft advisory linked in the references section for specific instructions.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious Excel Process Creation&rdquo; to identify potentially malicious Excel activity.</li>
<li>Monitor for unusual network connections originating from Excel processes after opening untrusted documents.</li>
<li>Educate users about the risks of opening unsolicited or suspicious Excel files to prevent initial access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>excel</category><category>out-of-bounds read</category><category>cve-2026-32188</category><category>information disclosure</category><category>vulnerability</category></item><item><title>Go Markdown Library Out-of-Bounds Read Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-gomarkdown-oob-read/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-gomarkdown-oob-read/</guid><description>A vulnerability in the go-markdown library exists where processing a malformed input containing a '&lt;' character that is not followed by a '&gt;' character with a SmartypantsRenderer can lead to an out-of-bounds read or a panic, causing a denial of service.</description><content:encoded><![CDATA[<p>The <code>go-markdown</code> library, specifically versions prior to <code>0.0.0-20260411013819-759bbc3e3207</code>, is susceptible to an out-of-bounds read vulnerability. This flaw is triggered when the <code>SmartypantsRenderer</code> processes malformed markdown input containing a <code>&lt;</code> character that is not subsequently closed by a <code>&gt;</code> character within the remaining text. The vulnerability resides within the <code>smartLeftAngle()</code> function in <code>html/smartypants.go</code>. Exploitation of this vulnerability leads to either an out-of-bounds read (if the slice length is less than its capacity) or a panic (if the slice length equals its capacity), ultimately resulting in a denial of service. This issue affects applications utilizing the vulnerable versions of the <code>go-markdown</code> library for markdown processing.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious markdown input string containing an unclosed <code>&lt;</code> tag (e.g., <code>&lt;a</code>).</li>
<li>The application receives the crafted markdown input for processing.</li>
<li>The application uses the <code>go-markdown</code> library with the <code>SmartypantsRenderer</code> enabled to render the markdown input.</li>
<li>The <code>SmartypantsRenderer</code> calls the <code>smartLeftAngle()</code> function in <code>html/smartypants.go</code> to handle the <code>&lt;</code> character.</li>
<li>The <code>smartLeftAngle()</code> function encounters the unclosed <code>&lt;</code> tag, triggering the out-of-bounds read due to missing <code>&gt;</code> character.</li>
<li>Depending on the slice&rsquo;s length and capacity, the program either reads an extra byte of data (if length &lt; capacity) or panics (if length == capacity).</li>
<li>The application crashes due to the panic or becomes unstable due to the out-of-bounds read.</li>
<li>Service availability is disrupted, resulting in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial of service. Any service using the vulnerable <code>go-markdown</code> library to process potentially malicious markdown input is susceptible to crashing or becoming unstable. The impact is a loss of availability for the affected service. While the specific number of affected services or sectors is not mentioned in the source, any application relying on <code>go-markdown</code> is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>go-markdown</code> library to version <code>0.0.0-20260411013819-759bbc3e3207</code> or later to patch the vulnerability as detailed in the overview.</li>
<li>Implement input validation to sanitize or reject markdown input containing unclosed <code>&lt;</code> tags. This mitigates the risk even if the vulnerable library is used.</li>
<li>Monitor application logs for unexpected panics or errors originating from the <code>go-markdown</code> library, specifically around markdown rendering routines.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>markdown</category><category>denial-of-service</category><category>go</category><category>out-of-bounds read</category></item><item><title>Adobe Photoshop Out-of-Bounds Read Vulnerability (CVE-2026-27289)</title><link>https://feed.craftedsignal.io/briefs/2026-04-photoshop-oob-read/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-photoshop-oob-read/</guid><description>An out-of-bounds read vulnerability (CVE-2026-27289) in Adobe Photoshop Desktop versions 27.4 and earlier allows for potential code execution via a crafted file, requiring user interaction to trigger the exploit.</description><content:encoded><![CDATA[<p>Adobe Photoshop Desktop versions 27.4 and earlier are vulnerable to an out-of-bounds read vulnerability (CVE-2026-27289). This flaw can be triggered when Photoshop parses a specially crafted file, leading to a read operation beyond the allocated memory boundary. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code within the security context of the user running the application. The vulnerability requires user interaction, as a victim must open a malicious file in Photoshop to initiate the attack. This poses a risk to users who handle files from untrusted sources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious image file specifically designed to trigger the out-of-bounds read vulnerability in Adobe Photoshop.</li>
<li>The attacker delivers the crafted file to the victim via email, shared drive, or other means.</li>
<li>The victim, unaware of the malicious nature of the file, opens it using a vulnerable version of Adobe Photoshop (27.4 or earlier).</li>
<li>Photoshop attempts to parse the crafted image file.</li>
<li>Due to the malformed structure of the file, Photoshop&rsquo;s parsing routine attempts to read data beyond the allocated buffer.</li>
<li>The out-of-bounds read occurs, potentially exposing sensitive information or causing a crash.</li>
<li>An attacker leverages the out-of-bounds read to gain control of program execution flow.</li>
<li>The attacker executes arbitrary code within the context of the user running Photoshop, potentially leading to system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-27289 can lead to arbitrary code execution on the victim&rsquo;s machine.  Since the code runs within the user&rsquo;s context, the attacker gains the same privileges as the user.  This could enable the attacker to install malware, steal sensitive data, or pivot to other systems on the network. While the specific number of affected users isn&rsquo;t specified, all users running versions 27.4 and earlier are potentially vulnerable, with the most likely targets being graphic designers, photographers, and other creative professionals.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Adobe Photoshop to a version greater than 27.4 to patch CVE-2026-27289.</li>
<li>Implement user awareness training to educate users about the risks of opening files from untrusted sources to mitigate the initial access vector.</li>
<li>Monitor process creation events for suspicious Photoshop processes using the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Enable file access monitoring to identify instances where Photoshop opens unusual or suspicious files, which could be indicative of malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-27289</category><category>out-of-bounds read</category><category>adobe photoshop</category><category>code execution</category></item><item><title>NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32864)</title><link>https://feed.craftedsignal.io/briefs/2026-04-labview-oob-read/</link><pubDate>Wed, 08 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-labview-oob-read/</guid><description>A memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds read in mgcore_SH_25_3!aligned_free(), potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted VI file.</description><content:encoded><![CDATA[<p>A memory corruption vulnerability, identified as CVE-2026-32864, exists within National Instruments (NI) LabVIEW software. The flaw is triggered by an out-of-bounds read within the <code>mgcore_SH_25_3!aligned_free()</code> function. An attacker can exploit this vulnerability by enticing a user to open a specially crafted VI (Virtual Instrument) file. Successful exploitation could lead to information disclosure, potentially exposing sensitive data handled by LabVIEW, or arbitrary code execution, granting the attacker control over the affected system. This vulnerability affects NI LabVIEW versions 2026 Q1 (26.1.0) and all prior versions, making a wide range of LabVIEW installations susceptible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious LabVIEW VI file designed to trigger the out-of-bounds read in <code>mgcore_SH_25_3!aligned_free()</code>.</li>
<li>The attacker uses social engineering to convince a victim to open the specially crafted VI file.</li>
<li>The victim opens the malicious VI file using a vulnerable version of NI LabVIEW (2026 Q1 (26.1.0) and prior).</li>
<li>LabVIEW attempts to process the malformed data within the VI file.</li>
<li>The <code>mgcore_SH_25_3!aligned_free()</code> function is called during the VI file processing.</li>
<li>The out-of-bounds read occurs when <code>aligned_free()</code> attempts to access memory outside of allocated bounds.</li>
<li>Depending on the memory layout, this can lead to information disclosure by leaking memory contents, or arbitrary code execution by overwriting critical data.</li>
<li>If arbitrary code execution is achieved, the attacker can then install malware, exfiltrate data, or perform other malicious actions on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32864 can have serious consequences. Information disclosure could expose sensitive data processed by LabVIEW, such as measurement data, control algorithms, or proprietary code. Arbitrary code execution would allow an attacker to gain complete control over the affected system, enabling them to install malware, steal data, or disrupt operations. The vulnerability affects a broad range of LabVIEW users, potentially impacting industrial control systems, research and development environments, and other critical applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch provided by National Instruments for CVE-2026-32864 to remediate the out-of-bounds read vulnerability. Refer to the NI security advisory for specific instructions.</li>
<li>Deploy the Sigma rule <code>LabVIEW_Suspicious_VI_File_Open</code> to detect suspicious LabVIEW VI files being opened based on file path or other attributes.</li>
<li>Monitor process creation events for <code>LabVIEW.exe</code> spawning unusual child processes or accessing unusual network resources after a VI file has been opened, which could indicate successful code execution (see <code>LabVIEW_Suspicious_Child_Process</code> rule).</li>
<li>Educate users about the risks of opening untrusted VI files and emphasize the importance of verifying the source of any VI file before opening it.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32864</category><category>labview</category><category>memory-corruption</category><category>out-of-bounds-read</category></item><item><title>NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32863)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ni-labview-oob-read/</link><pubDate>Tue, 07 Apr 2026 20:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ni-labview-oob-read/</guid><description>A memory corruption vulnerability due to an out-of-bounds read in NI LabVIEW's `sentry_transaction_context_set_operation()` function could lead to information disclosure or arbitrary code execution by opening a specially crafted VI file.</description><content:encoded><![CDATA[<p>A critical memory corruption vulnerability (CVE-2026-32863) exists in National Instruments (NI) LabVIEW, specifically within the <code>sentry_transaction_context_set_operation()</code> function. This out-of-bounds read vulnerability can be exploited by an attacker who successfully convinces a LabVIEW user to open a malicious, specially crafted VI file. Successful exploitation could lead to information disclosure, potentially exposing sensitive data handled by LabVIEW, or even allow for arbitrary code execution, granting the attacker control over the affected system. The vulnerability affects NI LabVIEW 2026 Q1 (version 26.1.0) and all prior versions, posing a risk to a wide range of users in industrial, scientific, and engineering sectors that rely on LabVIEW for automation and data acquisition.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Craft Malicious VI File:</strong> The attacker crafts a malicious VI (Virtual Instrument) file designed to trigger the out-of-bounds read in <code>sentry_transaction_context_set_operation()</code>. This likely involves manipulating the structure of the VI file to contain invalid or unexpected data.</li>
<li><strong>Social Engineering:</strong> The attacker uses social engineering techniques to convince a LabVIEW user to open the malicious VI file. This could involve sending the file as an email attachment, hosting it on a website, or any other method of tricking the user into opening the file within LabVIEW.</li>
<li><strong>VI File Opened:</strong> The user opens the malicious VI file using NI LabVIEW (version 26.1.0 or earlier).</li>
<li><strong><code>sentry_transaction_context_set_operation()</code> Triggered:</strong> When LabVIEW attempts to process the crafted VI file, the <code>sentry_transaction_context_set_operation()</code> function is called with the manipulated data.</li>
<li><strong>Out-of-Bounds Read:</strong> The vulnerability in <code>sentry_transaction_context_set_operation()</code> is triggered, leading to an out-of-bounds read. This could involve reading memory outside of the intended buffer or data structure.</li>
<li><strong>Information Disclosure or Code Execution:</strong> The out-of-bounds read leads to either information disclosure (leaking sensitive data from memory) or arbitrary code execution (allowing the attacker to execute malicious code on the system), depending on how the memory corruption is handled.</li>
<li><strong>Persistence/Lateral Movement (If Code Execution):</strong> If the attacker achieves code execution, they may attempt to establish persistence on the system (e.g., by creating a scheduled task or modifying startup files) and/or move laterally to other systems on the network.</li>
<li><strong>Achieve Objective:</strong> The attacker leverages the compromised system to achieve their ultimate objective, which could include stealing data, disrupting operations, or using the system as a launchpad for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32863 can have severe consequences. Information disclosure could expose sensitive data related to industrial processes, research data, or proprietary algorithms. Arbitrary code execution would allow attackers to gain full control over the affected LabVIEW system, potentially disrupting critical operations, manipulating data, or causing physical damage in automated systems. While the exact number of victims is unknown, the wide use of NI LabVIEW across various industries (manufacturing, aerospace, research, etc.) means that a successful, widespread attack could have a significant impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update NI LabVIEW to a version that is not affected by CVE-2026-32863, as detailed in the NI security advisory (<a href="https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/2026/memory-corruption-vulnerabilities-in-ni-labview.html">https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/2026/memory-corruption-vulnerabilities-in-ni-labview.html</a>).</li>
<li>Implement user awareness training to educate LabVIEW users about the risks of opening untrusted VI files and the potential for social engineering attacks.</li>
<li>Monitor process creation events for LabVIEW (<code>LabVIEW.exe</code>) spawning unusual child processes, as this could indicate successful code execution following exploitation. Deploy a Sigma rule such as the one provided to detect this behavior.</li>
<li>Enable and review process execution logs for <code>LabVIEW.exe</code> and related processes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32863</category><category>labview</category><category>out-of-bounds read</category><category>memory corruption</category><category>arbitrary code execution</category><category>information disclosure</category></item><item><title>V-SFT Out-of-Bounds Read Vulnerability (CVE-2026-32929)</title><link>https://feed.craftedsignal.io/briefs/2026-04-vsft-oob-read/</link><pubDate>Wed, 01 Apr 2026 23:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-vsft-oob-read/</guid><description>V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability (CVE-2026-32929) in VS6ComFile!get_macro_mem_COM, where opening a crafted V7 file may lead to information disclosure.</description><content:encoded><![CDATA[<p>CVE-2026-32929 is an out-of-bounds read vulnerability affecting V-SFT versions 6.2.10.0 and prior. The vulnerability exists within the <code>VS6ComFile!get_macro_mem_COM</code> function. An attacker can exploit this vulnerability by crafting a malicious V7 file. When a user opens the crafted V7 file with a vulnerable version of V-SFT, the out-of-bounds read can be triggered, leading to potential information disclosure. This vulnerability was disclosed on April 1, 2026, and poses a risk to users who rely on V-SFT software for industrial automation and control systems. Organizations should assess their exposure to this vulnerability and take appropriate mitigation steps, including updating to a patched version of V-SFT.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target using V-SFT versions 6.2.10.0 or prior.</li>
<li>Attacker crafts a malicious V7 file specifically designed to trigger the out-of-bounds read in <code>VS6ComFile!get_macro_mem_COM</code>.</li>
<li>Attacker delivers the crafted V7 file to the target, possibly through social engineering or other means.</li>
<li>The target user opens the malicious V7 file using the vulnerable V-SFT software.</li>
<li>V-SFT attempts to parse the crafted V7 file, triggering the <code>VS6ComFile!get_macro_mem_COM</code> function.</li>
<li>Due to the malformed structure of the crafted V7 file, the <code>get_macro_mem_COM</code> function attempts to read data beyond the allocated buffer.</li>
<li>The out-of-bounds read occurs, potentially disclosing sensitive information from the V-SFT process memory.</li>
<li>The attacker may be able to leverage the disclosed information to further compromise the system or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32929 can lead to information disclosure. An attacker who successfully exploits this vulnerability may be able to read sensitive data from the memory of the V-SFT process. The disclosed information could potentially include configuration settings, credentials, or other sensitive data that could be used to further compromise the affected system. While the NVD does not yet contain scoring data, JPCERT/CC assigned a base score of 7.8 HIGH.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade V-SFT to a version that patches CVE-2026-32929 to remediate the vulnerability.</li>
<li>Deploy the Sigma rule &ldquo;Detect V-SFT V7 File Opening&rdquo; to detect attempts to open V7 files using the vulnerable software.</li>
<li>Monitor systems running V-SFT for unexpected behavior or crashes, which could indicate exploitation attempts.</li>
<li>Educate users about the risks of opening files from untrusted sources to prevent social engineering attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-32929</category><category>out-of-bounds read</category><category>information disclosure</category><category>v-sft</category></item><item><title>V-SFT Out-of-Bounds Read Vulnerability (CVE-2026-32926)</title><link>https://feed.craftedsignal.io/briefs/2026-04-v-sft-oob-read/</link><pubDate>Wed, 01 Apr 2026 23:17:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-v-sft-oob-read/</guid><description>V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in the VS6ComFile!load_link_inf function, allowing for potential information disclosure when opening a crafted V7 file.</description><content:encoded><![CDATA[<p>CVE-2026-32926 is an out-of-bounds read vulnerability affecting V-SFT versions 6.2.10.0 and earlier. The vulnerability exists within the <code>VS6ComFile!load_link_inf</code> function, which is responsible for processing V7 files. An attacker can exploit this vulnerability by crafting a malicious V7 file that, when opened by a vulnerable V-SFT application, triggers an out-of-bounds read. Successful exploitation could lead to information disclosure, potentially exposing sensitive data to the attacker. This vulnerability was reported and disclosed by JPCERT/CC.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable V-SFT version (6.2.10.0 or prior).</li>
<li>Attacker crafts a malicious V7 file designed to trigger the out-of-bounds read in the <code>VS6ComFile!load_link_inf</code> function.</li>
<li>Attacker delivers the crafted V7 file to a target user, potentially through social engineering or other means.</li>
<li>The target user opens the malicious V7 file using the vulnerable V-SFT application.</li>
<li>The <code>VS6ComFile!load_link_inf</code> function attempts to read data beyond the allocated buffer while processing the crafted V7 file.</li>
<li>This out-of-bounds read allows the attacker to access memory regions outside the intended boundaries.</li>
<li>The attacker gains access to sensitive information stored in the adjacent memory regions due to the information disclosure.</li>
<li>The attacker extracts the disclosed information for malicious purposes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32926 can lead to information disclosure, potentially exposing sensitive data to an attacker. While the specific impact depends on the nature of the disclosed information, it could include intellectual property, configuration details, or other confidential data. The vulnerability affects systems running vulnerable versions of V-SFT.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade V-SFT to a version greater than 6.2.10.0 to patch CVE-2026-32926.</li>
<li>Monitor for attempts to open unusual or suspicious V7 files using V-SFT applications.</li>
<li>Implement the Sigma rule <code>Detect VS-FT opening unusual files</code> to detect suspicious file access patterns.</li>
<li>Review the V-SFT vendor&rsquo;s advisory for additional mitigation guidance (<a href="https://felib.fujielectric.co.jp/en/M10010/M20060/document_detail/5d9dd71d-9494-41a4-aa5c-8e6b8b21066b?region=en-glb">https://felib.fujielectric.co.jp/en/M10010/M20060/document_detail/5d9dd71d-9494-41a4-aa5c-8e6b8b21066b?region=en-glb</a>).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-32926</category><category>out-of-bounds read</category><category>information disclosure</category></item><item><title>Critical Vulnerabilities in NetScaler ADC and Gateway Allow Sensitive Data Exposure and Session Hijacking</title><link>https://feed.craftedsignal.io/briefs/2026-04-netscaler-vulns/</link><pubDate>Wed, 01 Apr 2026 08:44:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-netscaler-vulns/</guid><description>Unauthenticated attackers can exploit CVE-2026-3055 (out-of-bounds read) to exfiltrate sensitive data from NetScaler ADC and Gateway, while CVE-2026-4368 (race condition) enables user session hijacking, necessitating immediate patching and enhanced monitoring.</description><content:encoded><![CDATA[<p>Citrix NetScaler ADC and Gateway are affected by two critical vulnerabilities, CVE-2026-3055 and CVE-2026-4368. CVE-2026-3055 is an out-of-bounds read vulnerability that allows an unauthenticated attacker to read arbitrary memory content. This could lead to the exfiltration of sensitive data like credentials and session tokens. CVE-2026-4368 is a race condition vulnerability that can lead to user session mix-up, potentially allowing one user to access another user&rsquo;s session. CISA has added CVE-2026-3055 to its Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild as of March 30, 2026. The affected versions include NetScaler ADC and NetScaler Gateway 14.1 before 14.1-66.59, 13.1 before 13.1-62.23, and NetScaler ADC FIPS and NDcPP before 13.1-37.262. Defenders should prioritize patching and closely monitor affected systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a specially crafted request to a vulnerable NetScaler ADC or Gateway configured as a SAML IDP (for CVE-2026-3055).</li>
<li>Due to insufficient input validation, the appliance attempts to read memory beyond the allocated buffer.</li>
<li>The out-of-bounds read allows the attacker to access sensitive information stored in memory, such as session tokens, credentials, or other confidential data.</li>
<li>The attacker exfiltrates the gleaned sensitive information via network communication.</li>
<li>For CVE-2026-4368, multiple users attempt to authenticate to a NetScaler ADC or Gateway configured as a Gateway or AAA virtual server.</li>
<li>A race condition occurs during session creation or management.</li>
<li>One user&rsquo;s session is incorrectly associated with another user&rsquo;s account.</li>
<li>The attacker gains unauthorized access to another user&rsquo;s session, potentially performing actions on their behalf or accessing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3055 allows attackers to steal sensitive information, potentially leading to account compromise, data breaches, and further unauthorized access to internal resources. CVE-2026-4368 can lead to unauthorized access to user accounts, potentially exposing sensitive data or enabling malicious activities under the guise of a legitimate user. Given that CISA has confirmed active exploitation of CVE-2026-3055, organizations using affected NetScaler products are at immediate risk. The impact spans across all sectors utilizing these products for application delivery and secure access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch NetScaler ADC and Gateway to the latest versions: 14.1-66.59 or later, 13.1-62.23 or later, and 13.1-37.262 or later for FIPS and NDcPP to remediate CVE-2026-3055 and CVE-2026-4368 as described in the Citrix advisory (<a href="https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300">https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300</a>).</li>
<li>Deploy the Sigma rule <code>Detect Netscaler CVE-2026-3055 GET Request</code> to identify potential exploitation attempts of CVE-2026-3055 based on suspicious HTTP GET requests targeting the SAML IDP.</li>
<li>Enable and review NetScaler audit logs for unusual authentication patterns or session activity that could indicate exploitation of CVE-2026-4368.</li>
<li>Monitor web server logs for HTTP requests with abnormally long URIs, which may be indicative of attempts to trigger the out-of-bounds read in CVE-2026-3055.</li>
<li>Apply the Sigma rule <code>Detect Netscaler CVE-2026-4368 POST Request</code> to identify potential exploitation attempts of CVE-2026-4368 based on suspicious HTTP POST requests targeting the Gateway or AAA virtual server</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>netscaler</category><category>cve-2026-3055</category><category>cve-2026-4368</category><category>out-of-bounds read</category><category>race condition</category><category>memory corruption</category><category>session hijacking</category></item><item><title>RetroDebugger Out-of-Bounds Read Vulnerability (CVE-2026-4753)</title><link>https://feed.craftedsignal.io/briefs/2026-03-retrodebugger-oob-read/</link><pubDate>Tue, 24 Mar 2026 06:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-retrodebugger-oob-read/</guid><description>RetroDebugger before v0.64.72 is vulnerable to an out-of-bounds read (CVE-2026-4753), potentially leading to information disclosure or denial of service.</description><content:encoded>&lt;p>RetroDebugger before version v0.64.72 contains an out-of-bounds read vulnerability, identified as CVE-2026-4753. This flaw could allow an attacker to read sensitive information from memory locations outside of the intended buffer, potentially leading to information disclosure or causing the application to crash, resulting in a denial of service. The vulnerability was reported by the Government Technology Agency of Singapore Cyber Security Group (GovTech CSG). Given the critical CVSS score of…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4753</category><category>out-of-bounds read</category><category>retrodebugger</category></item><item><title>Out-of-bounds Read Vulnerability in fabiangreffrath woof (CVE-2026-4750)</title><link>https://feed.craftedsignal.io/briefs/2026-03-woof-oob-read/</link><pubDate>Tue, 24 Mar 2026 06:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-woof-oob-read/</guid><description>CVE-2026-4750 is a critical out-of-bounds read vulnerability affecting fabiangreffrath woof versions before 15.3.0, potentially leading to information disclosure or denial of service.</description><content:encoded>&lt;p>An out-of-bounds read vulnerability exists in fabiangreffrath woof, a web server for simple file sharing. This vulnerability, identified as CVE-2026-4750, affects woof versions prior to 15.3.0. The vulnerability was reported by the Government Technology Agency of Singapore Cyber Security Group (GovTech CSG). An attacker could potentially exploit this vulnerability to read sensitive information from the server&amp;rsquo;s memory or cause a denial-of-service condition. This poses a risk to organizations…&lt;/p>
</content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4750</category><category>out-of-bounds read</category><category>webserver</category><category>woof</category></item><item><title>Google Chrome WebAudio Out-of-Bounds Read Vulnerability (CVE-2026-4677)</title><link>https://feed.craftedsignal.io/briefs/2026-03-chrome-webaudio-oob-read/</link><pubDate>Tue, 24 Mar 2026 01:17:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-chrome-webaudio-oob-read/</guid><description>A remote attacker can trigger an out-of-bounds memory read in Google Chrome's WebAudio implementation by crafting a malicious HTML page (CVE-2026-4677), affecting versions prior to 146.0.7680.165.</description><content:encoded>&lt;p>CVE-2026-4677 describes an out-of-bounds memory read vulnerability in the WebAudio component of Google Chrome. Successful exploitation of this vulnerability allows a remote attacker to potentially read sensitive information from the browser&amp;rsquo;s memory. The vulnerability exists in Google Chrome versions prior to 146.0.7680.165. The attack involves crafting a malicious HTML page that, when opened in a vulnerable version of Chrome, triggers the out-of-bounds read in the WebAudio processing. The…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-4677</category><category>chrome</category><category>webaudio</category><category>out-of-bounds read</category></item><item><title>Google Chrome Out-of-Bounds Read Vulnerability (CVE-2026-4674)</title><link>https://feed.craftedsignal.io/briefs/2026-03-chrome-oob-read/</link><pubDate>Tue, 24 Mar 2026 01:17:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-chrome-oob-read/</guid><description>A remote attacker can exploit an out-of-bounds read vulnerability (CVE-2026-4674) in Google Chrome versions prior to 146.0.7680.165 to achieve out-of-bounds memory access via a crafted HTML page, impacting confidentiality, integrity, and availability.</description><content:encoded>&lt;p>CVE-2026-4674 is an out-of-bounds read vulnerability affecting Google Chrome versions prior to 146.0.7680.165. This vulnerability resides in the CSS processing engine of Chrome. A remote attacker can exploit this vulnerability by crafting a malicious HTML page that, when opened in a vulnerable version of Chrome, triggers an out-of-bounds read. The successful exploitation of this vulnerability allows the attacker to read sensitive information from the browser&amp;rsquo;s memory, potentially leading to…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>out-of-bounds read</category><category>chrome</category></item><item><title>CVE-2026-31613 SMB Client Out-of-Bounds Read Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-cve-2026-31613-smb-oob-read/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cve-2026-31613-smb-oob-read/</guid><description>CVE-2026-31613 is an out-of-bounds read vulnerability in the SMB client when parsing symlink error responses, requiring patching to prevent potential information disclosure or denial-of-service.</description><content:encoded><![CDATA[<p>CVE-2026-31613 is a security vulnerability affecting the SMB (Server Message Block) client. The vulnerability stems from an out-of-bounds read error that occurs during the parsing of symlink error responses. This can potentially allow a malicious SMB server to send crafted responses that, when processed by the client, lead to reading memory outside of allocated buffers. While the specific details of exploitation are not provided in the source, the nature of an out-of-bounds read can lead to information disclosure or a denial-of-service condition. Microsoft has released a security update to address this vulnerability. Defenders should apply the patch to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious SMB server is set up to serve crafted responses.</li>
<li>A client attempts to connect to the malicious SMB server via the SMB protocol.</li>
<li>The server sends a crafted SMB response containing a symlink error.</li>
<li>The client attempts to parse the symlink error response.</li>
<li>Due to the vulnerability, the client reads data beyond the allocated buffer.</li>
<li>The out-of-bounds read could result in information disclosure, where sensitive data is exposed, or cause a denial-of-service.</li>
<li>The attacker leverages the disclosed information for further exploitation (if information disclosure occurs).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31613 could lead to information disclosure, potentially exposing sensitive data from the affected system&rsquo;s memory. Alternatively, the vulnerability could be exploited to trigger a denial-of-service condition, disrupting the availability of the SMB client. The scope of impact depends on the specific data accessible via the out-of-bounds read and the system&rsquo;s role within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-31613 on all systems using the SMB client to prevent potential out-of-bounds reads.</li>
<li>Enable SMB logging to monitor for unusual SMB responses or error conditions that may indicate exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-31613</category><category>smb</category><category>out-of-bounds read</category><category>vulnerability</category></item><item><title>MikroTik RouterOS SCEP Endpoint Out-of-Bounds Read Vulnerability (CVE-2026-7668)</title><link>https://feed.craftedsignal.io/briefs/2024-01-routeros-oob-read/</link><pubDate>Tue, 02 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-routeros-oob-read/</guid><description>MikroTik RouterOS 6.49.8 is vulnerable to an out-of-bounds read in the SCEP endpoint component, triggered by remote manipulation of the transactionID/messageType argument, potentially leading to denial of service or information disclosure.</description><content:encoded><![CDATA[<p>CVE-2026-7668 is an out-of-bounds read vulnerability affecting MikroTik RouterOS version 6.49.8. The vulnerability exists within the SCEP (Simple Certificate Enrollment Protocol) endpoint, specifically in the <code>ASN1_STRING_data</code> function located in the <code>nova/lib/www/scep.p</code> library. A remote attacker can exploit this vulnerability by manipulating the <code>transactionID</code> or <code>messageType</code> arguments. Publicly available exploits exist, increasing the risk of exploitation. The vendor has been notified but has not provided a response. Exploitation could lead to denial of service or information disclosure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a MikroTik RouterOS device running version 6.49.8 with an exposed SCEP endpoint.</li>
<li>The attacker crafts a malicious SCEP request containing a specially crafted <code>transactionID</code> or <code>messageType</code> argument.</li>
<li>The attacker sends the malicious SCEP request to the RouterOS device&rsquo;s SCEP endpoint.</li>
<li>The <code>ASN1_STRING_data</code> function processes the request and attempts to access memory outside the allocated buffer due to the manipulated argument.</li>
<li>The out-of-bounds read occurs, potentially leading to a crash of the SCEP process or the disclosure of sensitive information from adjacent memory regions.</li>
<li>If the attacker can reliably trigger a crash, they can cause a denial of service.</li>
<li>If sensitive information is disclosed, the attacker might use this to further compromise the device or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7668 can lead to a denial of service condition on the affected MikroTik RouterOS device. An attacker could potentially cause the device to become unresponsive, disrupting network services. Furthermore, the out-of-bounds read could expose sensitive information stored in memory, which an attacker could use to further compromise the device or network. Since an exploit is publicly available, the risk of widespread exploitation is elevated.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for SCEP requests with unusually long or malformed <code>transactionID</code> or <code>messageType</code> parameters. Use the network connection rule below.</li>
<li>Implement rate limiting on the SCEP endpoint to mitigate potential denial-of-service attacks.</li>
<li>While no patch is available, consider disabling the SCEP endpoint if it is not required.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>out-of-bounds read</category><category>routeros</category></item></channel></rss>