Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2681: Out-of-bounds Write

0
Medium
VulnerabilityCVE-2026-2681cvecve-2026-2681
Published: Thu Feb 19 2026 (02/19/2026, 06:58:47 UTC)
Source: CVE Database V5

Description

CVE-2026-2681 is an out-of-bounds stack write vulnerability in the blst cryptographic library's blst_sha256_bcopy assembly routine. It occurs due to a missing zero-length guard when a zero-length salt parameter is passed to key generation functions like blst_keygen_v5(). Exploitation by a remote attacker can cause memory corruption leading to immediate process termination, resulting in a denial-of-service (DoS) condition. The vulnerability does not impact confidentiality or integrity but affects availability. No authentication or user interaction is required, and the attack vector is network-based. The CVSS score is 5. 3, indicating medium severity. There are no known exploits in the wild, and no patches have been linked yet. European organizations using the blst library in cryptographic applications should assess exposure and apply mitigations promptly to prevent service disruption.

AI-Powered Analysis

AILast updated: 02/19/2026, 07:25:59 UTC

Technical Analysis

CVE-2026-2681 is a medium-severity vulnerability identified in the blst cryptographic library, specifically within the blst_sha256_bcopy assembly routine. The flaw arises from the absence of a guard condition against zero-length inputs for the salt parameter in key generation functions such as blst_keygen_v5(). When a zero-length salt is provided, the function performs an out-of-bounds write on the stack, corrupting memory. This memory corruption leads to immediate termination of the affected process, causing a denial-of-service (DoS) condition. The vulnerability can be triggered remotely without requiring any privileges or user interaction, as long as the application exposes the vulnerable key generation functionality over a network interface. While the vulnerability does not compromise confidentiality or integrity of data, it directly impacts availability by crashing the process. The CVSS 3.1 base score is 5.3, reflecting the medium severity due to the ease of exploitation and the impact limited to availability. No known exploits have been reported in the wild, and no official patches have been linked yet, suggesting that affected parties should monitor vendor advisories closely. The vulnerability is relevant to any software or service using the blst library for cryptographic operations, particularly those exposing key generation APIs to external inputs.

Potential Impact

For European organizations, the primary impact of CVE-2026-2681 is a denial-of-service condition caused by process crashes in applications using the blst cryptographic library. This can disrupt services relying on cryptographic key generation, potentially affecting secure communications, authentication mechanisms, or blockchain-related operations that depend on blst. Although the vulnerability does not allow data leakage or unauthorized access, the availability impact can lead to service outages, degraded user experience, and operational interruptions. Organizations in sectors such as finance, telecommunications, and critical infrastructure that utilize blst for cryptographic functions could face increased risk of service disruption. Additionally, if the vulnerable functionality is exposed to the internet or untrusted networks, attackers could remotely trigger crashes, amplifying the threat. The lack of known exploits reduces immediate risk, but the ease of exploitation and network accessibility necessitate proactive mitigation to maintain service reliability.

Mitigation Recommendations

European organizations should first identify all applications and services using the blst cryptographic library, especially those exposing key generation functions like blst_keygen_v5() to external inputs. Until an official patch is released, implement input validation to reject zero-length salt parameters before they reach the vulnerable function. Employ application-layer firewalls or network filtering to restrict access to vulnerable APIs from untrusted networks. Consider sandboxing or isolating processes that perform cryptographic operations to limit the impact of potential crashes. Monitor application logs and system stability metrics for signs of unexpected process terminations. Engage with software vendors or open-source maintainers for updates and patches addressing this vulnerability. Once patches are available, prioritize their deployment in production environments. Additionally, conduct penetration testing and fuzzing on cryptographic interfaces to detect similar input validation issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2026-02-18T12:19:32.190Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996b7926aea4a407a43b2c1

Added to database: 2/19/2026, 7:11:14 AM

Last enriched: 2/19/2026, 7:25:59 AM

Last updated: 2/19/2026, 8:11:53 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats