Description
Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_canswitch.cpp the parser does not properly validate a CANswitch DLC value, allowing remote attackers to cause a denial of service or possibly execute arbitrary code via crafted CANswitch frames.
Published: 2026-05-01
Score: 8.6 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A buffer overflow in Open Vehicle Monitoring System 3 (version 3.3.005) occurs when the parser of canformat_canswitch.cpp fails to validate a CANswitch DLC value, allowing a remote attacker to supply a malformed frame. The overflow can cause a crash, resulting in denial of service, or if the overflow is exploited successfully, arbitrary code execution on the OVMS3 device. This vulnerability is a classic stack‑based buffer overflow, permitting loss of confidentiality, integrity, and availability.

Affected Systems

The vulnerability affects only the Open Vehicle Monitoring System 3, specifically the 3.3.005 release. No vendors or additional product lines are listed as affected, and no CPE strings are provided.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity vulnerability. The EPSS score is not available, so the likelihood of exploitation cannot be quantified. The likely attack vector, based on the description, is that an attacker would need the ability to inject CANswitch frames onto the vehicle’s CAN bus, which typically requires physical or network access to the bus. The vulnerability is not listed in the CISA KEV catalog, and no publicly known exploits are cited. Nevertheless, the potential for remote code execution warrants swift action.

Generated by OpenCVE AI on May 2, 2026 at 07:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OVMS3 to a version newer than 3.3.005 that contains the buffer‑overflow fix.
  • If an upgrade is infeasible, implement network filtering or canbus firewalls to block or sanitize malformed CANswitch frames with invalid DLC values.
  • Continuously monitor for unexpected or malformed CAN traffic and investigate anomalies promptly.

Generated by OpenCVE AI on May 2, 2026 at 07:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 08:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in OVMS3 CANswitch DLC Parsing Allows Remote Denial or Code Execution

Fri, 01 May 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-121
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 01 May 2026 17:00:00 +0000

Type Values Removed Values Added
Description Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_canswitch.cpp the parser does not properly validate a CANswitch DLC value, allowing remote attackers to cause a denial of service or possibly execute arbitrary code via crafted CANswitch frames.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-01T17:40:16.645Z

Reserved: 2026-04-27T00:00:00.000Z

Link: CVE-2026-42469

cve-icon Vulnrichment

Updated: 2026-05-01T17:40:12.624Z

cve-icon NVD

Status : Received

Published: 2026-05-01T17:16:25.260

Modified: 2026-05-01T18:16:15.837

Link: CVE-2026-42469

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T08:00:14Z

Weaknesses