Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24820: CWE-125 Out-of-bounds Read in turanszkij WickedEngine

0
Medium
VulnerabilityCVE-2026-24820cvecve-2026-24820cwe-125
Published: Tue Jan 27 2026 (01/27/2026, 08:56:34 UTC)
Source: CVE Database V5
Vendor/Project: turanszkij
Product: WickedEngine

Description

Out-of-bounds Read vulnerability in turanszkij WickedEngine (WickedEngine/LUA modules). This vulnerability is associated with program files ldebug.C. This issue affects WickedEngine: before 0.71.705.

AI-Powered Analysis

AILast updated: 01/27/2026, 09:21:59 UTC

Technical Analysis

CVE-2026-24820 is classified as a CWE-125 out-of-bounds read vulnerability found in the WickedEngine, an open-source graphics/game engine developed by turanszkij. The vulnerability specifically resides in the LUA modules associated with the ldebug.C source files. An out-of-bounds read occurs when the program reads memory outside the bounds of allocated buffers, which can lead to unintended disclosure of sensitive information or cause application instability. This vulnerability affects all versions of WickedEngine prior to 0.71.705. The CVSS 4.0 vector indicates that exploitation requires local access (AV:L), low attack complexity (AC:L), no privileges required beyond low (PR:L), and user interaction (UI:A). The impact is primarily on confidentiality (V:C) and availability (RE:L), with no impact on integrity or system integrity. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability is rated medium severity with a CVSS score of 5.1, reflecting moderate risk. WickedEngine is used in game development and graphical applications, so the vulnerability could expose sensitive runtime data or cause crashes if exploited. The lack of remote exploitation reduces the immediacy of the threat but does not eliminate risk in environments where local access is possible.

Potential Impact

For European organizations, the primary impact of CVE-2026-24820 lies in potential unauthorized disclosure of sensitive information from applications built on WickedEngine, as well as possible application crashes or instability. This could affect software development companies, game studios, and any enterprises using WickedEngine for graphical or simulation purposes. Confidentiality breaches could expose proprietary code or runtime data, impacting intellectual property and competitive advantage. Availability impacts could disrupt development workflows or end-user experiences. Since exploitation requires local access and user interaction, the risk is mitigated in well-controlled environments but remains significant in scenarios where insider threats or compromised user accounts exist. The absence of known exploits reduces immediate risk, but organizations should remain vigilant. The medium severity rating suggests that while the vulnerability is not critical, it warrants timely remediation to prevent escalation or chaining with other vulnerabilities.

Mitigation Recommendations

1. Monitor official WickedEngine repositories and turanszkij announcements closely for the release of patches addressing CVE-2026-24820 and apply updates promptly. 2. Restrict local access to systems running WickedEngine to trusted personnel only, implementing strict access controls and user privilege management. 3. Employ application whitelisting and endpoint detection to identify and prevent unauthorized execution of potentially malicious LUA scripts or modules. 4. Conduct regular code reviews and static analysis on LUA modules to detect unsafe memory operations that could lead to out-of-bounds reads. 5. Use sandboxing or containerization for development environments to isolate WickedEngine processes and limit the impact of potential exploitation. 6. Educate developers and users about the risks of local exploitation and the importance of not executing untrusted code or scripts. 7. Implement comprehensive logging and monitoring to detect unusual application behavior or crashes that might indicate exploitation attempts. 8. Consider network segmentation to limit lateral movement if a local compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GovTech CSG
Date Reserved
2026-01-27T08:48:56.893Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69787ff64623b1157c11b8e5

Added to database: 1/27/2026, 9:05:58 AM

Last enriched: 1/27/2026, 9:21:59 AM

Last updated: 2/6/2026, 10:41:19 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats