Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2241: Out-of-Bounds Read in janet-lang janet

0
Medium
VulnerabilityCVE-2026-2241cvecve-2026-2241
Published: Mon Feb 09 2026 (02/09/2026, 16:02:08 UTC)
Source: CVE Database V5
Vendor/Project: janet-lang
Product: janet

Description

A vulnerability was found in janet-lang janet up to 1.40.1. This affects the function os_strftime of the file src/core/os.c. Performing a manipulation results in out-of-bounds read. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is named 0f285855f0e34f9183956be5f16e045f54626bff. To fix this issue, it is recommended to deploy a patch.

AI-Powered Analysis

AILast updated: 02/09/2026, 16:45:37 UTC

Technical Analysis

The vulnerability CVE-2026-2241 affects the janet-lang janet interpreter, a lightweight functional programming language implementation used for scripting and embedding. The flaw resides in the os_strftime function located in src/core/os.c, which handles formatting of date and time strings. Due to improper bounds checking, a crafted input can cause an out-of-bounds read, allowing the program to access memory beyond the allocated buffer. This can lead to unintended information disclosure or cause the program to crash, potentially impacting availability. The vulnerability requires local access with limited privileges (PR:L) and does not need user interaction or elevated authentication, making it a local privilege risk rather than a remote attack vector. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the limited attack vector but potential impact on confidentiality and availability. The issue affects janet versions 1.40.0 and 1.40.1. A patch has been released (commit 0f285855f0e34f9183956be5f16e045f54626bff) to correct the bounds checking logic and prevent out-of-bounds reads. No known exploits in the wild have been reported, but the exploit code is publicly available, increasing the risk of future attacks if unpatched.

Potential Impact

For European organizations, the impact of CVE-2026-2241 depends on the extent of janet-lang usage within their software development, scripting, or embedded systems. While janet is a niche language, it may be used in specialized applications or internal tooling. Exploitation could lead to leakage of sensitive memory contents or cause application crashes, potentially disrupting operations or exposing confidential data. Since exploitation requires local access, the threat is higher in environments where multiple users share systems or where attackers have gained initial foothold. Organizations in sectors with high security requirements, such as finance, government, or critical infrastructure, could face increased risk if janet is part of their technology stack. The medium severity rating suggests moderate risk, but the availability of a public exploit elevates urgency for patching to prevent lateral movement or privilege escalation attempts.

Mitigation Recommendations

European organizations should first inventory their use of janet-lang, identifying any systems running versions 1.40.0 or 1.40.1. Immediate application of the official patch (commit 0f285855f0e34f9183956be5f16e045f54626bff) is critical to remediate the vulnerability. For environments where patching is delayed, implement strict local access controls and monitoring to detect suspicious activity indicative of exploitation attempts. Employ application whitelisting and restrict execution of untrusted scripts to reduce risk. Conduct code reviews and testing to ensure no other parts of the codebase invoke vulnerable functions unsafely. Additionally, enhance endpoint detection and response (EDR) capabilities to identify anomalous memory access patterns or crashes related to this vulnerability. Regularly update threat intelligence feeds to stay informed about any emerging exploit campaigns targeting this CVE.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-09T09:38:29.872Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698a0bd54b57a58fa15e776f

Added to database: 2/9/2026, 4:31:17 PM

Last enriched: 2/9/2026, 4:45:37 PM

Last updated: 2/9/2026, 7:06:34 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats