Description
Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_canswitch.cpp the parser does not properly validate a CANswitch DLC value, allowing remote attackers to cause a denial of service or possibly execute arbitrary code via crafted CANswitch frames.
Published: 2026-05-01
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A buffer overflow in Open Vehicle Monitoring System 3 (version 3.3.005) occurs when the parser of canformat_canswitch.cpp fails to validate a CANswitch DLC value, allowing a remote attacker to supply a malformed frame. The overflow can cause a crash, resulting in denial of service, or if the overflow is exploited successfully, arbitrary code execution on the OVMS3 device. This vulnerability is a classic stack‑based buffer overflow, permitting loss of confidentiality, integrity, and availability.

Affected Systems

The vulnerability affects only the Open Vehicle Monitoring System 3, specifically the 3.3.005 release. No vendors or additional product lines are listed as affected, and no CPE strings are provided.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity vulnerability. The EPSS score is not available, so the likelihood of exploitation cannot be quantified. The likely attack vector, based on the description, is that an attacker would need the ability to inject CANswitch frames onto the vehicle’s CAN bus, which typically requires physical or network access to the bus. The vulnerability is not listed in the CISA KEV catalog, and no publicly known exploits are cited. Nevertheless, the potential for remote code execution warrants swift action.

Generated by OpenCVE AI on May 2, 2026 at 07:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OVMS3 to a version newer than 3.3.005 that contains the buffer‑overflow fix.
  • If an upgrade is infeasible, implement network filtering or canbus firewalls to block or sanitize malformed CANswitch frames with invalid DLC values.
  • Continuously monitor for unexpected or malformed CAN traffic and investigate anomalies promptly.

Generated by OpenCVE AI on May 2, 2026 at 07:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Openvehicles open Vehicle Monitoring System
Openvehicles open Vehicle Monitoring System Firmware
CPEs cpe:2.3:h:openvehicles:open_vehicle_monitoring_system:-:*:*:*:*:*:*:*
cpe:2.3:o:openvehicles:open_vehicle_monitoring_system_firmware:3.3.005:*:*:*:*:*:*:*
Vendors & Products Openvehicles open Vehicle Monitoring System
Openvehicles open Vehicle Monitoring System Firmware

Thu, 07 May 2026 19:00:00 +0000


Mon, 04 May 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Openvehicles
Openvehicles open Vehicle Monitoring System 3
Vendors & Products Openvehicles
Openvehicles open Vehicle Monitoring System 3

Sat, 02 May 2026 08:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in OVMS3 CANswitch DLC Parsing Allows Remote Denial or Code Execution

Fri, 01 May 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-121
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 01 May 2026 17:00:00 +0000

Type Values Removed Values Added
Description Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_canswitch.cpp the parser does not properly validate a CANswitch DLC value, allowing remote attackers to cause a denial of service or possibly execute arbitrary code via crafted CANswitch frames.
References

Subscriptions

Openvehicles Open Vehicle Monitoring System Open Vehicle Monitoring System 3 Open Vehicle Monitoring System Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-07T18:42:33.535Z

Reserved: 2026-04-27T00:00:00.000Z

Link: CVE-2026-42469

cve-icon Vulnrichment

Updated: 2026-05-01T17:40:12.624Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-01T17:16:25.260

Modified: 2026-05-20T15:18:24.273

Link: CVE-2026-42469

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T19:44:52Z

Weaknesses