CVE-2026-27710: CWE-191: Integer Underflow (Wrap or Wraparound) in M2Team NanaZip
NanaZip is an open source file archive. Starting in version 5.0.1252.0 and prior to versions 6.0.1638.0 and 6.5.1638.0, a denial-of-service vulnerability exists in NanaZip’s `.NET Single File Application` parser. A crafted bundle can force an integer underflow in header-size calculation and trigger an unbounded memory allocation attempt during archive open. Versions 6.0.1638.0 and 6.5.1638.0 fix the issue.
AI Analysis
Technical Summary
CVE-2026-27710 is an integer underflow vulnerability classified under CWE-191 found in the NanaZip file archiver software, specifically in its .NET Single File Application parser. The vulnerability affects NanaZip versions starting from 5.0.1252.0 up to versions prior to 6.0.1638.0 and 6.5.1638.0. The root cause is an integer underflow during the calculation of the header size when processing a specially crafted archive bundle. This underflow causes the software to miscalculate the size, leading to an attempt to allocate an unbounded amount of memory. Such an allocation can exhaust system resources, resulting in a denial-of-service (DoS) condition by crashing the application or severely degrading system performance. The CVSS 4.0 base score is 5.1, indicating medium severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:L), and user interaction required (UI:P). The vulnerability does not impact confidentiality, integrity, or availability beyond the DoS effect. The flaw was publicly disclosed on February 25, 2026, and fixed in NanaZip versions 6.0.1638.0 and 6.5.1638.0. No known exploits have been reported in the wild, but the vulnerability could be leveraged by attackers to disrupt systems where vulnerable versions are in use. The issue highlights the importance of robust input validation and safe integer arithmetic in archive parsing code.
Potential Impact
The primary impact of CVE-2026-27710 is denial-of-service, where an attacker can cause NanaZip to crash or consume excessive memory by opening a maliciously crafted archive. This can disrupt workflows that rely on NanaZip for file compression and decompression, potentially halting automated processes or user activities involving archive files. While the vulnerability does not allow code execution or data compromise, the DoS can affect availability of services or systems that depend on NanaZip, especially in environments where it is integrated into automated pipelines or used by multiple users. Organizations with many users or automated systems processing archives may experience operational disruptions. Since exploitation requires local access and user interaction, remote exploitation is unlikely without additional attack vectors. However, insider threats or social engineering could facilitate exploitation. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to targeted DoS attacks.
Mitigation Recommendations
To mitigate CVE-2026-27710, organizations should upgrade NanaZip to versions 6.0.1638.0 or later, where the vulnerability is fixed. Until upgrades can be applied, restrict access to vulnerable NanaZip versions to trusted users only and avoid opening untrusted or suspicious archive files. Implement application whitelisting and endpoint protection to detect and block attempts to open malicious archives. Monitor system resource usage for unusual spikes that may indicate exploitation attempts. Consider sandboxing or isolating archive extraction processes to limit impact of potential crashes. Educate users about the risks of opening archives from unverified sources to reduce the likelihood of user interaction-based exploitation. Regularly review and update software inventories to identify vulnerable NanaZip installations. Finally, coordinate with software vendors and security teams to stay informed about patches and advisories related to NanaZip.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, Canada, France, Australia, Netherlands, Sweden
CVE-2026-27710: CWE-191: Integer Underflow (Wrap or Wraparound) in M2Team NanaZip
Description
NanaZip is an open source file archive. Starting in version 5.0.1252.0 and prior to versions 6.0.1638.0 and 6.5.1638.0, a denial-of-service vulnerability exists in NanaZip’s `.NET Single File Application` parser. A crafted bundle can force an integer underflow in header-size calculation and trigger an unbounded memory allocation attempt during archive open. Versions 6.0.1638.0 and 6.5.1638.0 fix the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27710 is an integer underflow vulnerability classified under CWE-191 found in the NanaZip file archiver software, specifically in its .NET Single File Application parser. The vulnerability affects NanaZip versions starting from 5.0.1252.0 up to versions prior to 6.0.1638.0 and 6.5.1638.0. The root cause is an integer underflow during the calculation of the header size when processing a specially crafted archive bundle. This underflow causes the software to miscalculate the size, leading to an attempt to allocate an unbounded amount of memory. Such an allocation can exhaust system resources, resulting in a denial-of-service (DoS) condition by crashing the application or severely degrading system performance. The CVSS 4.0 base score is 5.1, indicating medium severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:L), and user interaction required (UI:P). The vulnerability does not impact confidentiality, integrity, or availability beyond the DoS effect. The flaw was publicly disclosed on February 25, 2026, and fixed in NanaZip versions 6.0.1638.0 and 6.5.1638.0. No known exploits have been reported in the wild, but the vulnerability could be leveraged by attackers to disrupt systems where vulnerable versions are in use. The issue highlights the importance of robust input validation and safe integer arithmetic in archive parsing code.
Potential Impact
The primary impact of CVE-2026-27710 is denial-of-service, where an attacker can cause NanaZip to crash or consume excessive memory by opening a maliciously crafted archive. This can disrupt workflows that rely on NanaZip for file compression and decompression, potentially halting automated processes or user activities involving archive files. While the vulnerability does not allow code execution or data compromise, the DoS can affect availability of services or systems that depend on NanaZip, especially in environments where it is integrated into automated pipelines or used by multiple users. Organizations with many users or automated systems processing archives may experience operational disruptions. Since exploitation requires local access and user interaction, remote exploitation is unlikely without additional attack vectors. However, insider threats or social engineering could facilitate exploitation. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to targeted DoS attacks.
Mitigation Recommendations
To mitigate CVE-2026-27710, organizations should upgrade NanaZip to versions 6.0.1638.0 or later, where the vulnerability is fixed. Until upgrades can be applied, restrict access to vulnerable NanaZip versions to trusted users only and avoid opening untrusted or suspicious archive files. Implement application whitelisting and endpoint protection to detect and block attempts to open malicious archives. Monitor system resource usage for unusual spikes that may indicate exploitation attempts. Consider sandboxing or isolating archive extraction processes to limit impact of potential crashes. Educate users about the risks of opening archives from unverified sources to reduce the likelihood of user interaction-based exploitation. Regularly review and update software inventories to identify vulnerable NanaZip installations. Finally, coordinate with software vendors and security teams to stay informed about patches and advisories related to NanaZip.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-23T17:56:51.203Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f8c2fb7ef31ef0b6c21c8
Added to database: 2/25/2026, 11:56:31 PM
Last enriched: 3/5/2026, 11:16:34 AM
Last updated: 4/12/2026, 3:45:15 PM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.