Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1678: Out-of-bounds Write in zephyrproject-rtos Zephyr

0
Critical
VulnerabilityCVE-2026-1678cvecve-2026-1678
Published: Thu Mar 05 2026 (03/05/2026, 06:21:36 UTC)
Source: CVE Database V5
Vendor/Project: zephyrproject-rtos
Product: Zephyr

Description

CVE-2026-1678 is a critical out-of-bounds write vulnerability in the Zephyr RTOS's DNS resolver component. The dns_unpack_name() function incorrectly caches buffer tailroom size and reuses it while appending DNS labels, leading to an out-of-bounds write when processing malicious DNS responses. This flaw can be triggered remotely without authentication or user interaction, potentially allowing attackers to corrupt memory, cause denial of service, or execute arbitrary code. All versions of Zephyr with CONFIG_DNS_RESOLVER enabled are affected. The vulnerability has a CVSS score of 9. 4, reflecting its high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Organizations using Zephyr in IoT, embedded, or real-time systems should prioritize patching and implement network-level DNS filtering to mitigate risk.

AI-Powered Analysis

AILast updated: 03/05/2026, 07:02:38 UTC

Technical Analysis

CVE-2026-1678 is a critical vulnerability in the Zephyr real-time operating system's DNS resolver implementation, specifically within the dns_unpack_name() function. This function is responsible for parsing DNS names by appending DNS labels to a buffer. The vulnerability arises because dns_unpack_name() caches the buffer's tailroom size only once and reuses this cached value while appending labels. As the buffer grows during processing, the cached tailroom size becomes inaccurate, causing the final null terminator to be written beyond the allocated buffer boundary. When assertions are disabled (which is the default configuration), this out-of-bounds write can be triggered by a maliciously crafted DNS response packet. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network if CONFIG_DNS_RESOLVER is enabled in Zephyr. The out-of-bounds write can lead to memory corruption, potentially enabling attackers to crash the system (denial of service) or execute arbitrary code, compromising confidentiality, integrity, and availability of the affected device. The vulnerability affects all versions of Zephyr, indicating a systemic issue in the DNS resolver code. Although no known exploits have been reported in the wild, the high CVSS score of 9.4 underscores the critical nature of this flaw. Zephyr is widely used in embedded and IoT devices, making this vulnerability particularly concerning for resource-constrained environments where patching may be delayed or difficult.

Potential Impact

The impact of CVE-2026-1678 is significant for organizations deploying Zephyr-based devices, especially in IoT, industrial control, and embedded systems. Exploitation allows remote attackers to perform out-of-bounds writes without authentication or user interaction, leading to memory corruption. This can result in system crashes causing denial of service, or potentially arbitrary code execution, which could allow attackers to take control of affected devices. Such control could be leveraged to disrupt critical infrastructure, steal sensitive data, or pivot into internal networks. Given Zephyr's use in safety-critical and resource-constrained environments, the vulnerability poses risks to operational continuity and security. The broad version impact means many deployed devices are vulnerable until patched. The lack of known exploits in the wild currently reduces immediate risk, but the ease of exploitation and critical severity necessitate urgent mitigation to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2026-1678, organizations should prioritize updating Zephyr to a patched version once available from the vendor or community. In the interim, disabling CONFIG_DNS_RESOLVER if DNS resolution is not required can eliminate the attack surface. Network-level defenses should be employed, such as filtering and validating DNS responses to block malicious packets before they reach vulnerable devices. Implementing DNS over TLS or DNSSEC can reduce the risk of malicious DNS responses. Additionally, enabling assertions during development and testing can help detect memory corruption issues early. For embedded devices, consider applying runtime memory protection mechanisms if supported. Monitoring network traffic for anomalous DNS responses and maintaining an inventory of Zephyr-based devices will aid in rapid response. Finally, coordinate with device manufacturers and vendors to ensure timely firmware updates and security patches are deployed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zephyr
Date Reserved
2026-01-30T05:48:49.746Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a92731d1a09e29cbeaae24

Added to database: 3/5/2026, 6:48:17 AM

Last enriched: 3/5/2026, 7:02:38 AM

Last updated: 3/5/2026, 8:41:53 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses