Description
Golioth Firmware SDK version 0.10.0 prior to 0.22.0, fixed in commit d7f55b38, contain an out-of-bounds read in LightDB State string parsing. When processing a string payload, a payload_size value less than 2 can cause a size_t underflow when computing the number of bytes to copy (nbytes). The subsequent memcpy() reads past the end of the network buffer, which can crash the device. The condition is reachable from on_payload, and golioth_payload_is_null() does not block payload_size==1. A malicious server or MITM can trigger a denial of service.
Published: 2026-02-26
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Device Crash (Denial of Service)
Action: Apply Patch
AI Analysis

Impact

The vulnerability is an out‑of‑bounds read in the LightDB state string parsing routine of the Golioth Firmware SDK. When a payload is received, a payload_size value less than 2 triggers a size_t underflow during nbytes calculation, causing a memcpy to read past the end of the network buffer. This can crash the device, leading to a denial‑of‑service condition.

Affected Systems

The issue affects all releases of the Golioth Firmware SDK prior to 0.22.0, including the publicly available 0.10.0 version. Users deploying these versions should check the SDK version in their firmware and update if necessary.

Risk and Exploitability

The CVSS score of 6.3 indicates a moderate severity, while the EPSS score of less than 1 % suggests a low likelihood of exploitation in the wild, and it is not listed in the CISA KEV catalog. However, the vulnerability is remote and reachable from a malicious server or MITM attacker controlling the payload. Once triggered, the device will crash, so the attack can cause widespread service interruption if exploited on numerous endpoints.

Generated by OpenCVE AI on April 16, 2026 at 06:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Golioth Firmware SDK to version 0.22.0 or newer, which incorporates the fixing commit.
  • Configure the device to trust only authorized Golioth servers, enabling proper certificate validation and disabling unauthenticated connections to prevent MITM attacks.
  • If patching is delayed, modify the firmware to reject or sanitize payloads with payload_size less than 2 before processing, mitigating the underflow until a patch is applied.

Generated by OpenCVE AI on April 16, 2026 at 06:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
References

Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Golioth
Golioth firmware Sdk
Vendors & Products Golioth
Golioth firmware Sdk

Thu, 26 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
References

Thu, 26 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
Description Golioth Firmware SDK version 0.10.0 prior to 0.22.0, fixed in commit d7f55b38, contain an out-of-bounds read in LightDB State string parsing. When processing a string payload, a payload_size value less than 2 can cause a size_t underflow when computing the number of bytes to copy (nbytes). The subsequent memcpy() reads past the end of the network buffer, which can crash the device. The condition is reachable from on_payload, and golioth_payload_is_null() does not block payload_size==1. A malicious server or MITM can trigger a denial of service.
Title Golioth Firmware SDK < 0.22.0 LightDB State Out-of-Bounds Read
Weaknesses CWE-191
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Golioth Firmware Sdk
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-23T15:44:13.360Z

Reserved: 2026-01-15T18:42:20.937Z

Link: CVE-2026-23748

cve-icon Vulnrichment

Updated: 2026-02-27T16:06:18.488Z

cve-icon NVD

Status : Deferred

Published: 2026-02-26T18:23:06.550

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-23748

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T06:15:26Z

Weaknesses