Description
In the case of the cap_net service, when a key present in the old limit was omitted from the new limit, the missing key was treated as "allow any" instead of being rejected.

In certain scenarios, an application that had previously restricted a subset of network operations could ask for a new limit that extended the permissions of the process.
Published: 2026-05-21
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw in the libcap_net service causes any capability key omitted from an old limit to be treated as "allow any" rather than being rejected when a new limit is applied. This unintended allowance means an application that had previously restricted a subset of network operations could request a new limit that expands the process's network privileges, effectively granting the application higher‑than‑intended rights. The vulnerability is a classic example of Improper Restriction of Operations within the Bounds of a Task (CWE‑269). The result is the ability for a local or potentially compromised application to gain unauthorized network capabilities, which could lead to data exfiltration, unauthorized service connections, or other network‑based abuse.

Affected Systems

The issue affects the FreeBSD operating system when the cap_net service is in use. Any FreeBSD release that incorporates the vulnerable libcap_net implementation is at risk, as specific version ranges are not provided.

Risk and Exploitability

A CVSS score of 6.5 indicates moderate severity, and the EPSS score of <1% suggests a low exploitation probability. The KEV catalog does not mention this vulnerability, indicating no publicly known exploitation. Nevertheless, because the flaw permits privilege escalation for network capabilities when an application can re‑define capability limits, systems that rely on strict capability boundaries are at moderate‑to‑high risk. The attack likely requires local execution or an application that can invoke cap_net, making it a relevant threat for services that treat capability changes as privileged operations.

Generated by OpenCVE AI on May 21, 2026 at 17:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FreeBSD to the latest release or apply the security update that fixes the libcap_net limitation bug.
  • Ensure that applications only request the minimum network capabilities they need and validate capability changes to prevent unauthorized privilege expansion.
  • Limit which processes may invoke or modify cap_net, for example by using sandboxing, role‑based access controls, or sysctl settings that restrict capability modifications.
  • Reload the cap_net module or reboot the system after applying the patch to ensure the fix takes effect.

Generated by OpenCVE AI on May 21, 2026 at 17:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:freebsd:freebsd:14.3:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.3:p10:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.3:p11:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.3:p12:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.3:p13:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.3:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.3:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.3:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.3:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.3:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.3:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.3:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.3:p8:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.3:p9:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.4:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.4:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.4:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.4:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.4:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:14.4:rc1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:15.0:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:15.0:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:15.0:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:15.0:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:15.0:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:15.0:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:15.0:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:15.0:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:15.0:p8:*:*:*:*:*:*

Thu, 21 May 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Freebsd
Freebsd freebsd
Vendors & Products Freebsd
Freebsd freebsd

Thu, 21 May 2026 10:15:00 +0000

Type Values Removed Values Added
Description In the case of the cap_net service, when a key present in the old limit was omitted from the new limit, the missing key was treated as "allow any" instead of being rejected. In certain scenarios, an application that had previously restricted a subset of network operations could ask for a new limit that extended the permissions of the process.
Title Incorrect libcap_net limitation list manipulation
Weaknesses CWE-269
References

cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published:

Updated: 2026-05-21T14:37:03.795Z

Reserved: 2026-05-11T16:27:44.891Z

Link: CVE-2026-45254

cve-icon Vulnrichment

Updated: 2026-05-21T13:56:04.394Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-21T10:16:26.380

Modified: 2026-05-21T19:00:47.593

Link: CVE-2026-45254

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T17:30:15Z

Weaknesses