Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23750: CWE-122 Heap-based Buffer Overflow in Golioth Pouch

0
High
VulnerabilityCVE-2026-23750cvecve-2026-23750cwe-122
Published: Thu Feb 26 2026 (02/26/2026, 17:33:13 UTC)
Source: CVE Database V5
Vendor/Project: Golioth
Product: Pouch

Description

Golioth Pouch version 0.1.0, prior to commit 1b2219a1, contains a heap-based buffer overflow in BLE GATT server certificate handling. server_cert_write() allocates a heap buffer of size CONFIG_POUCH_SERVER_CERT_MAX_LEN when receiving the first fragment, then appends subsequent fragments using memcpy() without verifying that sufficient capacity remains. An adjacent BLE client can send unauthenticated fragments whose combined size exceeds the allocated buffer, causing a heap overflow and crash; integrity impact is also possible due to memory corruption.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:36:39 UTC

Technical Analysis

CVE-2026-23750 is a heap-based buffer overflow vulnerability identified in Golioth Pouch version 0.1.0, specifically within the BLE GATT server certificate handling code. The vulnerable function, server_cert_write(), initially allocates a heap buffer sized according to CONFIG_POUCH_SERVER_CERT_MAX_LEN when receiving the first fragment of a server certificate. However, when subsequent fragments arrive, the function appends them using memcpy() without verifying that the buffer has sufficient remaining capacity. This lack of bounds checking allows an adjacent BLE client to send unauthenticated certificate fragments whose combined size exceeds the allocated buffer, resulting in a heap overflow. The overflow can cause the application to crash, leading to denial of service, and may also corrupt memory, potentially impacting the integrity of the device's operation. The vulnerability does not require any authentication or user interaction but does require physical proximity to the BLE device to send malicious fragments. The CVSS 4.0 vector indicates the attack is network-based (adjacent), with low complexity, no privileges or user interaction required, and high impact on integrity and availability. No patches or known exploits are currently reported, but the issue is publicly disclosed and should be addressed promptly. This vulnerability affects IoT devices using Golioth Pouch 0.1.0 for BLE communications, particularly those relying on BLE GATT server certificates for secure communication.

Potential Impact

The primary impact of this vulnerability is denial of service due to application crashes caused by heap overflow, which can disrupt device availability. Additionally, memory corruption from the overflow could lead to integrity violations, potentially allowing an attacker to manipulate device behavior or compromise sensitive data handled by the BLE GATT server. Since the attack requires no authentication and no user interaction, any attacker within BLE range can exploit this vulnerability, increasing the risk in environments with physical proximity to devices. Organizations deploying Golioth Pouch in IoT devices, especially in critical infrastructure, industrial control systems, or consumer electronics, face risks of service disruption and potential compromise of device integrity. This could lead to operational downtime, loss of trust, and increased attack surface for further exploitation. The lack of known exploits currently limits immediate widespread impact, but the vulnerability's disclosure means attackers could develop exploits, increasing future risk.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first upgrade Golioth Pouch to a version that includes a fix for CVE-2026-23750 once available. In the absence of an official patch, developers should implement strict bounds checking before appending certificate fragments to ensure the buffer is not overflowed. Specifically, modify server_cert_write() to verify that the total size of received fragments does not exceed CONFIG_POUCH_SERVER_CERT_MAX_LEN before performing memcpy operations. Additionally, consider implementing BLE-level access controls or whitelisting to restrict which devices can send certificate fragments, reducing exposure to unauthenticated attackers. Employ runtime protections such as heap canaries and memory-safe programming practices to detect and prevent exploitation. Monitoring BLE traffic for abnormal fragment sizes or patterns can help detect attempted exploitation. Finally, physically securing BLE devices to limit attacker proximity and educating users about the risks of unauthorized BLE connections can reduce attack likelihood.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-15T18:42:20.938Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a0a1ca85912abc71d0bb54

Added to database: 2/26/2026, 7:40:58 PM

Last enriched: 3/24/2026, 12:36:39 AM

Last updated: 4/13/2026, 9:26:51 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses