Description
OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, an attacker with physical access to the computer at the time user or administrator uses a token can cause a stack-buffer-overflow write in GET RESPONSE. The attack requires crafted USB device or smart card that would present the system with specially crafted responses to the APDUs. This issue has been patched in version 0.27.0.
Published: 2026-03-30
Score: 3.8 Low
EPSS: < 1% Very Low
KEV: No
Impact: Memory Corruption
Action: Patch
AI Analysis

Impact

A stack‑buffer‑overflow occurs in the GET RESPONSE routine of OpenSC, the open‑source smart card middleware. The overflow is triggered when a crafted response to an APDU is received. An attacker with physical access to the computer can exploit this by presenting a specially crafted USB device or smart card. The overflow overwrites stack data, potentially corrupting program execution or leading to denial of service. The weakness corresponds to common buffer‑overflow flaws (CWE‑120 and CWE‑121).

Affected Systems

The issue affects all installations of OpenSC prior to version 0.27.0. Users of OpenSC running on any operating system that utilizes smart card readers are vulnerable. The vulnerability is resolved in OpenSC 0.27.0 and later releases.

Risk and Exploitability

The CVSS score 3.8 indicates low to moderate severity, while the EPSS score of less than 1% suggests a very low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires physical access to the target machine and the presence of a malicious USB device or smart card, raising the barrier to attack. Consequently, while the flaw could allow an attacker to corrupt memory and potentially elevate privileges within a local user session, the overall risk to most deployments remains modest. However, mitigation is recommended to avoid any local compromise that could be leveraged by advanced threat actors.

Generated by OpenCVE AI on April 2, 2026 at 02:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update OpenSC to version 0.27.0 or later.
  • Restrict physical access to systems that host smart card readers.
  • Verify that only authorized smart card devices are connected.
  • Monitor USB ports for unknown or potentially malicious devices.

Generated by OpenCVE AI on April 2, 2026 at 02:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Opensc
Opensc opensc
Vendors & Products Opensc
Opensc opensc

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Opensc Project
Opensc Project opensc
CPEs cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*
Vendors & Products Opensc Project
Opensc Project opensc

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
References
Metrics threat_severity

None

threat_severity

Low


Mon, 30 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description OpenSC is an open source smart card tools and middleware. Prior to version 0.27.0, an attacker with physical access to the computer at the time user or administrator uses a token can cause a stack-buffer-overflow write in GET RESPONSE. The attack requires crafted USB device or smart card that would present the system with specially crafted responses to the APDUs. This issue has been patched in version 0.27.0.
Title OpenSC: Stack-buffer-overflow WRITE in GET RESPONSE
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 3.8, 'vector': 'CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}


Subscriptions

Opensc Opensc
Opensc Project Opensc
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-30T18:38:21.684Z

Reserved: 2025-05-29T16:34:07.176Z

Link: CVE-2025-49010

cve-icon Vulnrichment

Updated: 2026-03-30T18:38:18.555Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-30T18:16:16.950

Modified: 2026-04-01T18:01:59.100

Link: CVE-2025-49010

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-30T16:59:25Z

Links: CVE-2025-49010 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:11:15Z

Weaknesses