CVE-2026-0849Classic Buffer Overflow in Zephyr

Severity
6.8MEDIUMNVD
CNA3.8
EPSS
0.0%
top 94.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
Latest updateMar 14
PublishedMar 16

Description

Malformed ATAES132A responses with an oversized length field overflow a 52-byte stack buffer in the Zephyr crypto driver, allowing a compromised device or bus attacker to corrupt kernel memory and potentially hijack execution.

CVSS vector

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 0.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5zephyrproject-rtos/zephyr*4.3

Patches

🔴Vulnerability Details

1
CVEList
crypto: ATAES132A response length allows stack buffer overflow2026-03-14

🕵️Threat Intelligence

1
Wiz
CVE-2026-0849 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-0849 — Classic Buffer Overflow in Zephyr | cvebase