Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22780: CWE-770: Allocation of Resources Without Limits or Throttling in rizinorg rizin

0
Medium
VulnerabilityCVE-2026-22780cvecve-2026-22780cwe-770
Published: Mon Feb 02 2026 (02/02/2026, 20:52:23 UTC)
Source: CVE Database V5
Vendor/Project: rizinorg
Product: rizin

Description

Rizin is a UNIX-like reverse engineering framework and command-line toolset. Prior to 0.8.2, a heap overflow can be exploited when a malicious mach0 file, having bogus entries for the dyld chained segments, is parsed by rizin. This vulnerability is fixed in 0.8.2.

AI-Powered Analysis

AILast updated: 02/02/2026, 23:33:28 UTC

Technical Analysis

CVE-2026-22780 is a heap overflow vulnerability identified in the rizin reverse engineering framework, specifically in versions prior to 0.8.2. Rizin is a UNIX-like toolset used for reverse engineering and binary analysis. The vulnerability arises when rizin parses Mach-O files—executable file format used primarily on macOS—that contain malformed or bogus entries within the dyld chained segments. These segments are part of the dynamic linker data structures used to manage dependencies and symbol bindings. The malformed entries cause rizin to allocate resources without proper limits or throttling, leading to a heap overflow condition classified under CWE-770 (Allocation of Resources Without Limits or Throttling). This can result in memory corruption, potentially allowing an attacker to disrupt the program’s control flow or cause a denial of service by crashing the application. Exploitation requires the victim to open or analyze a crafted Mach-O file, thus requiring user interaction but no elevated privileges. The CVSS 3.1 base score is 4.4 (medium), reflecting local attack vector, low complexity, no privileges required, but user interaction needed, and impacts limited to integrity and availability without confidentiality loss. The vulnerability was fixed in rizin version 0.8.2, and users are advised to upgrade to this or later versions. No public exploits or active exploitation have been reported to date.

Potential Impact

For European organizations, the primary impact of CVE-2026-22780 lies in the potential compromise of integrity and availability of systems running vulnerable versions of rizin. Organizations involved in software security research, malware analysis, or reverse engineering—such as cybersecurity firms, academic institutions, and defense contractors—are the most likely users of rizin and thus at risk. Exploitation could lead to application crashes or potentially arbitrary code execution within the context of the user running rizin, which may disrupt analysis workflows or lead to further compromise if chained with other vulnerabilities. While the vulnerability does not directly expose confidentiality, disruption of critical reverse engineering tasks could delay incident response or malware investigations. Since exploitation requires user interaction and local access, the threat is somewhat limited to targeted attacks or insider threats. Nonetheless, the presence of this vulnerability in critical analysis tools could be leveraged by advanced persistent threat actors aiming to hinder forensic or research activities.

Mitigation Recommendations

To mitigate CVE-2026-22780, European organizations should immediately upgrade all rizin installations to version 0.8.2 or later, where the vulnerability is patched. Additionally, organizations should implement strict file validation and sandboxing when handling untrusted Mach-O files to limit the impact of any malformed inputs. Employing endpoint protection solutions that monitor for abnormal application behavior during reverse engineering tasks can help detect exploitation attempts. Limiting rizin usage to trusted personnel and enforcing least privilege principles reduces exposure. Regularly auditing and updating reverse engineering tools as part of software supply chain security practices will prevent similar vulnerabilities from persisting. Finally, educating users about the risks of opening untrusted binaries and enforcing secure operational procedures for malware analysis workflows will further reduce exploitation likelihood.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-09T18:27:19.388Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813004f9fa50a62f63a3a3

Added to database: 2/2/2026, 11:15:16 PM

Last enriched: 2/2/2026, 11:33:28 PM

Last updated: 2/7/2026, 9:42:26 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats