Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22185: CWE-125 Out-of-bounds Read in OpenLDAP Foundation OpenLDAP

0
Medium
VulnerabilityCVE-2026-22185cvecve-2026-22185cwe-125cwe-191
Published: Wed Jan 07 2026 (01/07/2026, 20:26:30 UTC)
Source: CVE Database V5
Vendor/Project: OpenLDAP Foundation
Product: OpenLDAP

Description

OpenLDAP Lightning Memory-Mapped Database (LMDB) versions up to and including 0.9.14, prior to commit 8e1fda8, contain a heap buffer underflow in the readline() function of mdb_load. When processing malformed input containing an embedded NUL byte, an unsigned offset calculation can underflow and cause an out-of-bounds read of one byte before the allocated heap buffer. This can cause mdb_load to crash, leading to a limited denial-of-service condition.

AI-Powered Analysis

AILast updated: 01/14/2026, 23:20:30 UTC

Technical Analysis

CVE-2026-22185 identifies a heap buffer underflow vulnerability in the OpenLDAP Foundation's Lightning Memory-Mapped Database (LMDB) component, specifically affecting versions up to and including 0.9.14. The vulnerability resides in the readline() function used by the mdb_load utility, which is responsible for loading database files. When mdb_load processes malformed input containing an embedded NUL byte, an unsigned offset calculation underflows, causing the function to read one byte before the allocated heap buffer boundary. This out-of-bounds read can lead to a crash of the mdb_load process, resulting in a denial-of-service (DoS) condition. The vulnerability does not allow for arbitrary code execution or data corruption but can disrupt service availability. Exploitation requires user interaction and local access to run mdb_load with crafted input, as network-based exploitation is not indicated. No public exploits are currently known, and no patches are linked yet, but the issue is documented and assigned a CVSS 4.6 (medium) severity score. The vulnerability is classified under CWE-125 (Out-of-bounds Read) and CWE-191 (Integer Underflow), highlighting the root cause as an offset underflow leading to memory safety issues. Organizations using OpenLDAP with LMDB for directory services or identity management should be aware of this vulnerability, as it could impact system stability and availability if exploited.

Potential Impact

For European organizations, the primary impact of CVE-2026-22185 is a limited denial-of-service condition affecting systems that utilize the vulnerable LMDB version within OpenLDAP. This could disrupt directory services, authentication, and identity management processes, potentially causing operational delays or outages in critical IT infrastructure. While the vulnerability does not compromise confidentiality or integrity, availability disruptions can affect business continuity, especially in sectors relying heavily on LDAP for access control and user management, such as government agencies, financial institutions, and telecommunications providers. The requirement for local access and user interaction limits the attack surface, but insider threats or compromised internal systems could exploit this flaw. Additionally, automated processes or scripts invoking mdb_load with untrusted input could inadvertently trigger the vulnerability. The lack of known exploits reduces immediate risk, but organizations should proactively address the issue to prevent future exploitation. Failure to mitigate could lead to service interruptions, impacting compliance with European data protection and operational resilience regulations.

Mitigation Recommendations

European organizations should implement the following specific mitigation strategies: 1) Upgrade LMDB to a version later than 0.9.14 where the vulnerability is resolved or apply vendor-provided patches once available. 2) Restrict access to the mdb_load utility to trusted administrators only, minimizing exposure to untrusted input. 3) Implement strict input validation and sanitization for any data processed by mdb_load, particularly filtering out malformed inputs containing embedded NUL bytes. 4) Monitor and audit usage of mdb_load and related OpenLDAP components to detect anomalous or unauthorized activity. 5) Employ application whitelisting and privilege restrictions to prevent unauthorized execution of mdb_load. 6) Incorporate this vulnerability into incident response and vulnerability management workflows to ensure timely detection and remediation. 7) For critical systems, consider isolating LDAP servers and limiting local user access to reduce the risk of exploitation. 8) Educate system administrators about the vulnerability and safe handling of LMDB data files. These targeted measures go beyond generic advice by focusing on controlling access, input handling, and operational monitoring specific to the vulnerable component.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-06T16:47:17.182Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695ec6692efadb62cf81402d

Added to database: 1/7/2026, 8:47:37 PM

Last enriched: 1/14/2026, 11:20:30 PM

Last updated: 2/6/2026, 11:47:58 PM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats