Description
Buffer Overflow vulnerability in ZerBea hcxpcapngtool v. 7.0.1-43-g2ee308e allows a local attacker to obtain sensitive information via the getradiotapfield() function
Published: 2026-03-26
Score: 6.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

A buffer overflow occurs in the getradiotapfield() function of the hcxpcapngtool component within ZerBea hcxtools. The flaw arises from inadequate bounds checking and is classified as CWE‑120. An attacker with local access to the system can trigger the overflow by providing a crafted capture file, enabling the reading of memory beyond the intended buffer and exposing sensitive data such as configuration details or potentially confidential network traffic metadata. The vulnerability does not provide direct execution of arbitrary code or privilege escalation, but the information revealed could be used for further attacks.

Affected Systems

The affected product is ZerBea hcxtools version 7.0.1‑43‑g2ee308e. No other vendors or product variants are listed as impacted, and earlier or later releases are presumed not to contain the same defect unless they retain the vulnerable code path.

Risk and Exploitability

The CVSS score of 6.2 reflects a medium severity impact, while the EPSS score of less than 1% indicates a low likelihood of exploitation in the wild. The vulnerability is not present in CISA’s KEV catalog. Exploitation requires local presence on the host where the tool is installed, and typically involves the creation or manipulation of a capture file that triggers the overflow. Even with a low probability of exploitation, the information exposure justifies prompt remediation.

Generated by OpenCVE AI on April 2, 2026 at 23:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ZerBea hcxtools to the latest release that patches the getradiotapfield buffer overflow.
  • If an upgrade is not immediately feasible, limit the use of hcxtools to trusted users and isolate the tool in a sandboxed environment.
  • Verify the integrity of the hcxtools binary by checking its checksum or signature against the vendor’s published values.

Generated by OpenCVE AI on April 2, 2026 at 23:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Zerbea hcxtools
CPEs cpe:2.3:a:zerbea:hcxtools:7.0.1:*:*:*:*:*:*:*
Vendors & Products Zerbea hcxtools

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Zerbea
Zerbea hcxpcapngtool
Vendors & Products Zerbea
Zerbea hcxpcapngtool

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Title hcxpcapngtool: hcxtools: ZerBea hcxpcapngtool: Information disclosure via buffer overflow in getradiotapfield() function
References
Metrics threat_severity

None

threat_severity

Low


Thu, 26 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Description Buffer Overflow vulnerability in ZerBea hcxpcapngtool v. 7.0.1-43-g2ee308e allows a local attacker to obtain sensitive information via the getradiotapfield() function
References

Subscriptions

Zerbea Hcxpcapngtool Hcxtools
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-26T15:29:41.020Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-29976

cve-icon Vulnrichment

Updated: 2026-03-26T15:29:35.787Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T15:16:36.137

Modified: 2026-04-02T19:37:58.263

Link: CVE-2026-29976

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-26T00:00:00Z

Links: CVE-2026-29976 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:39:01Z

Weaknesses