CVE-2026-23750: CWE-122 Heap-based Buffer Overflow in Golioth Pouch
Golioth Pouch version 0.1.0, prior to commit 1b2219a1, contains a heap-based buffer overflow in BLE GATT server certificate handling. server_cert_write() allocates a heap buffer of size CONFIG_POUCH_SERVER_CERT_MAX_LEN when receiving the first fragment, then appends subsequent fragments using memcpy() without verifying that sufficient capacity remains. An adjacent BLE client can send unauthenticated fragments whose combined size exceeds the allocated buffer, causing a heap overflow and crash; integrity impact is also possible due to memory corruption.
AI Analysis
Technical Summary
CVE-2026-23750 is a heap-based buffer overflow vulnerability identified in Golioth Pouch version 0.1.0, specifically within the BLE GATT server certificate handling code. The vulnerable function, server_cert_write(), initially allocates a heap buffer sized according to CONFIG_POUCH_SERVER_CERT_MAX_LEN when receiving the first fragment of a server certificate. However, when subsequent fragments arrive, the function appends them using memcpy() without verifying that the buffer has sufficient remaining capacity. This lack of bounds checking allows an adjacent BLE client to send unauthenticated certificate fragments whose combined size exceeds the allocated buffer, resulting in a heap overflow. The overflow can cause the application to crash, leading to denial of service, and may also corrupt memory, potentially impacting the integrity of the device's operation. The vulnerability does not require any authentication or user interaction but does require physical proximity to the BLE device to send malicious fragments. The CVSS 4.0 vector indicates the attack is network-based (adjacent), with low complexity, no privileges or user interaction required, and high impact on integrity and availability. No patches or known exploits are currently reported, but the issue is publicly disclosed and should be addressed promptly. This vulnerability affects IoT devices using Golioth Pouch 0.1.0 for BLE communications, particularly those relying on BLE GATT server certificates for secure communication.
Potential Impact
The primary impact of this vulnerability is denial of service due to application crashes caused by heap overflow, which can disrupt device availability. Additionally, memory corruption from the overflow could lead to integrity violations, potentially allowing an attacker to manipulate device behavior or compromise sensitive data handled by the BLE GATT server. Since the attack requires no authentication and no user interaction, any attacker within BLE range can exploit this vulnerability, increasing the risk in environments with physical proximity to devices. Organizations deploying Golioth Pouch in IoT devices, especially in critical infrastructure, industrial control systems, or consumer electronics, face risks of service disruption and potential compromise of device integrity. This could lead to operational downtime, loss of trust, and increased attack surface for further exploitation. The lack of known exploits currently limits immediate widespread impact, but the vulnerability's disclosure means attackers could develop exploits, increasing future risk.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first upgrade Golioth Pouch to a version that includes a fix for CVE-2026-23750 once available. In the absence of an official patch, developers should implement strict bounds checking before appending certificate fragments to ensure the buffer is not overflowed. Specifically, modify server_cert_write() to verify that the total size of received fragments does not exceed CONFIG_POUCH_SERVER_CERT_MAX_LEN before performing memcpy operations. Additionally, consider implementing BLE-level access controls or whitelisting to restrict which devices can send certificate fragments, reducing exposure to unauthenticated attackers. Employ runtime protections such as heap canaries and memory-safe programming practices to detect and prevent exploitation. Monitoring BLE traffic for abnormal fragment sizes or patterns can help detect attempted exploitation. Finally, physically securing BLE devices to limit attacker proximity and educating users about the risks of unauthorized BLE connections can reduce attack likelihood.
Affected Countries
United States, Germany, Japan, South Korea, China, United Kingdom, France, Canada, Australia, Netherlands
CVE-2026-23750: CWE-122 Heap-based Buffer Overflow in Golioth Pouch
Description
Golioth Pouch version 0.1.0, prior to commit 1b2219a1, contains a heap-based buffer overflow in BLE GATT server certificate handling. server_cert_write() allocates a heap buffer of size CONFIG_POUCH_SERVER_CERT_MAX_LEN when receiving the first fragment, then appends subsequent fragments using memcpy() without verifying that sufficient capacity remains. An adjacent BLE client can send unauthenticated fragments whose combined size exceeds the allocated buffer, causing a heap overflow and crash; integrity impact is also possible due to memory corruption.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-23750 is a heap-based buffer overflow vulnerability identified in Golioth Pouch version 0.1.0, specifically within the BLE GATT server certificate handling code. The vulnerable function, server_cert_write(), initially allocates a heap buffer sized according to CONFIG_POUCH_SERVER_CERT_MAX_LEN when receiving the first fragment of a server certificate. However, when subsequent fragments arrive, the function appends them using memcpy() without verifying that the buffer has sufficient remaining capacity. This lack of bounds checking allows an adjacent BLE client to send unauthenticated certificate fragments whose combined size exceeds the allocated buffer, resulting in a heap overflow. The overflow can cause the application to crash, leading to denial of service, and may also corrupt memory, potentially impacting the integrity of the device's operation. The vulnerability does not require any authentication or user interaction but does require physical proximity to the BLE device to send malicious fragments. The CVSS 4.0 vector indicates the attack is network-based (adjacent), with low complexity, no privileges or user interaction required, and high impact on integrity and availability. No patches or known exploits are currently reported, but the issue is publicly disclosed and should be addressed promptly. This vulnerability affects IoT devices using Golioth Pouch 0.1.0 for BLE communications, particularly those relying on BLE GATT server certificates for secure communication.
Potential Impact
The primary impact of this vulnerability is denial of service due to application crashes caused by heap overflow, which can disrupt device availability. Additionally, memory corruption from the overflow could lead to integrity violations, potentially allowing an attacker to manipulate device behavior or compromise sensitive data handled by the BLE GATT server. Since the attack requires no authentication and no user interaction, any attacker within BLE range can exploit this vulnerability, increasing the risk in environments with physical proximity to devices. Organizations deploying Golioth Pouch in IoT devices, especially in critical infrastructure, industrial control systems, or consumer electronics, face risks of service disruption and potential compromise of device integrity. This could lead to operational downtime, loss of trust, and increased attack surface for further exploitation. The lack of known exploits currently limits immediate widespread impact, but the vulnerability's disclosure means attackers could develop exploits, increasing future risk.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first upgrade Golioth Pouch to a version that includes a fix for CVE-2026-23750 once available. In the absence of an official patch, developers should implement strict bounds checking before appending certificate fragments to ensure the buffer is not overflowed. Specifically, modify server_cert_write() to verify that the total size of received fragments does not exceed CONFIG_POUCH_SERVER_CERT_MAX_LEN before performing memcpy operations. Additionally, consider implementing BLE-level access controls or whitelisting to restrict which devices can send certificate fragments, reducing exposure to unauthenticated attackers. Employ runtime protections such as heap canaries and memory-safe programming practices to detect and prevent exploitation. Monitoring BLE traffic for abnormal fragment sizes or patterns can help detect attempted exploitation. Finally, physically securing BLE devices to limit attacker proximity and educating users about the risks of unauthorized BLE connections can reduce attack likelihood.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-01-15T18:42:20.938Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a0a1ca85912abc71d0bb54
Added to database: 2/26/2026, 7:40:58 PM
Last enriched: 3/24/2026, 12:36:39 AM
Last updated: 4/13/2026, 9:26:51 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.