CVE-2026-2241: Out-of-Bounds Read in janet-lang janet
A vulnerability was found in janet-lang janet up to 1.40.1. This affects the function os_strftime of the file src/core/os.c. Performing a manipulation results in out-of-bounds read. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is named 0f285855f0e34f9183956be5f16e045f54626bff. To fix this issue, it is recommended to deploy a patch.
AI Analysis
Technical Summary
The vulnerability CVE-2026-2241 affects the janet-lang janet interpreter, a lightweight functional programming language implementation used for scripting and embedding. The flaw resides in the os_strftime function located in src/core/os.c, which handles formatting of date and time strings. Due to improper bounds checking, a crafted input can cause an out-of-bounds read, allowing the program to access memory beyond the allocated buffer. This can lead to unintended information disclosure or cause the program to crash, potentially impacting availability. The vulnerability requires local access with limited privileges (PR:L) and does not need user interaction or elevated authentication, making it a local privilege risk rather than a remote attack vector. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the limited attack vector but potential impact on confidentiality and availability. The issue affects janet versions 1.40.0 and 1.40.1. A patch has been released (commit 0f285855f0e34f9183956be5f16e045f54626bff) to correct the bounds checking logic and prevent out-of-bounds reads. No known exploits in the wild have been reported, but the exploit code is publicly available, increasing the risk of future attacks if unpatched.
Potential Impact
For European organizations, the impact of CVE-2026-2241 depends on the extent of janet-lang usage within their software development, scripting, or embedded systems. While janet is a niche language, it may be used in specialized applications or internal tooling. Exploitation could lead to leakage of sensitive memory contents or cause application crashes, potentially disrupting operations or exposing confidential data. Since exploitation requires local access, the threat is higher in environments where multiple users share systems or where attackers have gained initial foothold. Organizations in sectors with high security requirements, such as finance, government, or critical infrastructure, could face increased risk if janet is part of their technology stack. The medium severity rating suggests moderate risk, but the availability of a public exploit elevates urgency for patching to prevent lateral movement or privilege escalation attempts.
Mitigation Recommendations
European organizations should first inventory their use of janet-lang, identifying any systems running versions 1.40.0 or 1.40.1. Immediate application of the official patch (commit 0f285855f0e34f9183956be5f16e045f54626bff) is critical to remediate the vulnerability. For environments where patching is delayed, implement strict local access controls and monitoring to detect suspicious activity indicative of exploitation attempts. Employ application whitelisting and restrict execution of untrusted scripts to reduce risk. Conduct code reviews and testing to ensure no other parts of the codebase invoke vulnerable functions unsafely. Additionally, enhance endpoint detection and response (EDR) capabilities to identify anomalous memory access patterns or crashes related to this vulnerability. Regularly update threat intelligence feeds to stay informed about any emerging exploit campaigns targeting this CVE.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy
CVE-2026-2241: Out-of-Bounds Read in janet-lang janet
Description
A vulnerability was found in janet-lang janet up to 1.40.1. This affects the function os_strftime of the file src/core/os.c. Performing a manipulation results in out-of-bounds read. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is named 0f285855f0e34f9183956be5f16e045f54626bff. To fix this issue, it is recommended to deploy a patch.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2026-2241 affects the janet-lang janet interpreter, a lightweight functional programming language implementation used for scripting and embedding. The flaw resides in the os_strftime function located in src/core/os.c, which handles formatting of date and time strings. Due to improper bounds checking, a crafted input can cause an out-of-bounds read, allowing the program to access memory beyond the allocated buffer. This can lead to unintended information disclosure or cause the program to crash, potentially impacting availability. The vulnerability requires local access with limited privileges (PR:L) and does not need user interaction or elevated authentication, making it a local privilege risk rather than a remote attack vector. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the limited attack vector but potential impact on confidentiality and availability. The issue affects janet versions 1.40.0 and 1.40.1. A patch has been released (commit 0f285855f0e34f9183956be5f16e045f54626bff) to correct the bounds checking logic and prevent out-of-bounds reads. No known exploits in the wild have been reported, but the exploit code is publicly available, increasing the risk of future attacks if unpatched.
Potential Impact
For European organizations, the impact of CVE-2026-2241 depends on the extent of janet-lang usage within their software development, scripting, or embedded systems. While janet is a niche language, it may be used in specialized applications or internal tooling. Exploitation could lead to leakage of sensitive memory contents or cause application crashes, potentially disrupting operations or exposing confidential data. Since exploitation requires local access, the threat is higher in environments where multiple users share systems or where attackers have gained initial foothold. Organizations in sectors with high security requirements, such as finance, government, or critical infrastructure, could face increased risk if janet is part of their technology stack. The medium severity rating suggests moderate risk, but the availability of a public exploit elevates urgency for patching to prevent lateral movement or privilege escalation attempts.
Mitigation Recommendations
European organizations should first inventory their use of janet-lang, identifying any systems running versions 1.40.0 or 1.40.1. Immediate application of the official patch (commit 0f285855f0e34f9183956be5f16e045f54626bff) is critical to remediate the vulnerability. For environments where patching is delayed, implement strict local access controls and monitoring to detect suspicious activity indicative of exploitation attempts. Employ application whitelisting and restrict execution of untrusted scripts to reduce risk. Conduct code reviews and testing to ensure no other parts of the codebase invoke vulnerable functions unsafely. Additionally, enhance endpoint detection and response (EDR) capabilities to identify anomalous memory access patterns or crashes related to this vulnerability. Regularly update threat intelligence feeds to stay informed about any emerging exploit campaigns targeting this CVE.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-09T09:38:29.872Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698a0bd54b57a58fa15e776f
Added to database: 2/9/2026, 4:31:17 PM
Last enriched: 2/9/2026, 4:45:37 PM
Last updated: 2/9/2026, 7:06:34 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24777: CWE-862: Missing Authorization in opf openproject
MediumCVE-2025-66630: CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in gofiber fiber
CriticalCVE-2026-2242: Out-of-Bounds Read in janet-lang janet
MediumCVE-2026-21419: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Dell Display and Peripheral Manager (Windows)
MediumCVE-2025-7432: CWE-331 Insufficient Entropy in silabs.com Simplicity SDK
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.