CVE-2026-27709: CWE-125: Out-of-bounds Read in M2Team NanaZip
NanaZip is an open source file archive. Starting in version 5.0.1252.0 and prior to versions 6.0.1638.0 and 6.5.1638.0, NanaZip’s `.NET Single File Application` parser has an out-of-bounds read vulnerability in manifest parsing. A crafted bundle can provide a malformed `RelativePathLength` so the parser constructs a `std::string` from memory beyond `HeaderBuffer`, leading to crash and potential in-process memory disclosure. Versions 6.0.1638.0 and 6.5.1638.0 fix the issue.
AI Analysis
Technical Summary
CVE-2026-27709 is a medium severity vulnerability classified as CWE-125 (Out-of-bounds Read) found in NanaZip, an open-source file archiving tool developed by M2Team. The flaw exists in the .NET Single File Application parser component used by NanaZip versions starting from 5.0.1252.0 up to versions prior to 6.0.1638.0 and 6.5.1638.0. Specifically, the vulnerability occurs during manifest parsing when a maliciously crafted archive bundle supplies a malformed RelativePathLength value. This malformed value causes the parser to construct a std::string from memory beyond the allocated HeaderBuffer, resulting in an out-of-bounds read. The consequence of this memory access violation can lead to application crashes (denial of service) and potential disclosure of in-process memory contents, which may include sensitive data. Exploitation requires the attacker to have local access with low privileges and involves user interaction to open or process the crafted archive. The vulnerability does not require elevated privileges or network access, limiting its attack surface. No public exploits or active exploitation have been reported to date. NanaZip versions 6.0.1638.0 and 6.5.1638.0 include patches that correct the manifest parsing logic to prevent out-of-bounds reads. The CVSS v4.0 base score of 5.1 reflects the moderate risk posed by this vulnerability, balancing the potential impact against the conditions required for exploitation.
Potential Impact
The primary impact of CVE-2026-27709 is the potential for application crashes leading to denial of service when processing maliciously crafted archive files. Additionally, the out-of-bounds read may allow attackers to disclose sensitive in-process memory data, which could include confidential information or cryptographic material depending on the application's runtime context. While the vulnerability requires local access and user interaction, it could be leveraged by attackers who can trick users into opening malicious archives, such as through phishing or social engineering. Organizations relying on NanaZip for file archiving and extraction may face operational disruptions and data confidentiality risks if vulnerable versions are used. The scope is limited to systems where NanaZip is installed and used, primarily affecting end-user workstations and possibly some servers. Since no known exploits are in the wild, the immediate threat is moderate, but the vulnerability could be weaponized in targeted attacks against organizations that use NanaZip extensively or handle sensitive data archives.
Mitigation Recommendations
To mitigate CVE-2026-27709, organizations should immediately upgrade NanaZip to versions 6.0.1638.0 or 6.5.1638.0, where the vulnerability is patched. Until upgrades can be applied, restrict the use of NanaZip to trusted users and environments, and avoid opening untrusted or suspicious archive files. Implement endpoint security controls that detect and block attempts to open malformed archives. Educate users about the risks of opening archives from unknown or unverified sources to reduce the likelihood of social engineering exploitation. Additionally, consider application whitelisting to prevent execution of unauthorized versions of NanaZip. Monitoring for abnormal application crashes or memory access errors related to NanaZip can help detect exploitation attempts. Finally, maintain regular backups and incident response plans to recover from potential denial-of-service conditions.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, Canada, France, Australia, Netherlands, Sweden
CVE-2026-27709: CWE-125: Out-of-bounds Read in M2Team NanaZip
Description
NanaZip is an open source file archive. Starting in version 5.0.1252.0 and prior to versions 6.0.1638.0 and 6.5.1638.0, NanaZip’s `.NET Single File Application` parser has an out-of-bounds read vulnerability in manifest parsing. A crafted bundle can provide a malformed `RelativePathLength` so the parser constructs a `std::string` from memory beyond `HeaderBuffer`, leading to crash and potential in-process memory disclosure. Versions 6.0.1638.0 and 6.5.1638.0 fix the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27709 is a medium severity vulnerability classified as CWE-125 (Out-of-bounds Read) found in NanaZip, an open-source file archiving tool developed by M2Team. The flaw exists in the .NET Single File Application parser component used by NanaZip versions starting from 5.0.1252.0 up to versions prior to 6.0.1638.0 and 6.5.1638.0. Specifically, the vulnerability occurs during manifest parsing when a maliciously crafted archive bundle supplies a malformed RelativePathLength value. This malformed value causes the parser to construct a std::string from memory beyond the allocated HeaderBuffer, resulting in an out-of-bounds read. The consequence of this memory access violation can lead to application crashes (denial of service) and potential disclosure of in-process memory contents, which may include sensitive data. Exploitation requires the attacker to have local access with low privileges and involves user interaction to open or process the crafted archive. The vulnerability does not require elevated privileges or network access, limiting its attack surface. No public exploits or active exploitation have been reported to date. NanaZip versions 6.0.1638.0 and 6.5.1638.0 include patches that correct the manifest parsing logic to prevent out-of-bounds reads. The CVSS v4.0 base score of 5.1 reflects the moderate risk posed by this vulnerability, balancing the potential impact against the conditions required for exploitation.
Potential Impact
The primary impact of CVE-2026-27709 is the potential for application crashes leading to denial of service when processing maliciously crafted archive files. Additionally, the out-of-bounds read may allow attackers to disclose sensitive in-process memory data, which could include confidential information or cryptographic material depending on the application's runtime context. While the vulnerability requires local access and user interaction, it could be leveraged by attackers who can trick users into opening malicious archives, such as through phishing or social engineering. Organizations relying on NanaZip for file archiving and extraction may face operational disruptions and data confidentiality risks if vulnerable versions are used. The scope is limited to systems where NanaZip is installed and used, primarily affecting end-user workstations and possibly some servers. Since no known exploits are in the wild, the immediate threat is moderate, but the vulnerability could be weaponized in targeted attacks against organizations that use NanaZip extensively or handle sensitive data archives.
Mitigation Recommendations
To mitigate CVE-2026-27709, organizations should immediately upgrade NanaZip to versions 6.0.1638.0 or 6.5.1638.0, where the vulnerability is patched. Until upgrades can be applied, restrict the use of NanaZip to trusted users and environments, and avoid opening untrusted or suspicious archive files. Implement endpoint security controls that detect and block attempts to open malformed archives. Educate users about the risks of opening archives from unknown or unverified sources to reduce the likelihood of social engineering exploitation. Additionally, consider application whitelisting to prevent execution of unauthorized versions of NanaZip. Monitoring for abnormal application crashes or memory access errors related to NanaZip can help detect exploitation attempts. Finally, maintain regular backups and incident response plans to recover from potential denial-of-service conditions.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-23T17:56:51.203Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f8c2fb7ef31ef0b6c21c5
Added to database: 2/25/2026, 11:56:31 PM
Last enriched: 3/5/2026, 11:16:12 AM
Last updated: 4/12/2026, 3:43:58 PM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.