CVE-2026-27710: CWE-191: Integer Underflow (Wrap or Wraparound) in M2Team NanaZip
CVE-2026-27710 is a medium-severity integer underflow vulnerability in the NanaZip open source file archiver affecting versions from 5. 0. 1252. 0 up to but not including 6. 0. 1638. 0 and 6. 5. 1638. 0.
AI Analysis
Technical Summary
CVE-2026-27710 is an integer underflow vulnerability classified under CWE-191 found in the NanaZip file archiver software, specifically in its .NET Single File Application parser component. The vulnerability arises when processing a maliciously crafted archive bundle that manipulates the header-size calculation. During this calculation, an integer underflow occurs, causing the software to compute an incorrect, excessively large size for memory allocation. This leads to an unbounded memory allocation attempt which can exhaust system resources or cause the application to crash, resulting in a denial-of-service (DoS) condition. The affected versions include NanaZip releases starting from 5.0.1252.0 up to versions prior to 6.0.1638.0 and 6.5.1638.0. The vulnerability requires the user to open a specially crafted archive file, implying user interaction is necessary, and the attacker must have at least limited privileges on the system (local access). The CVSS 4.0 base score is 5.1, reflecting medium severity due to the limited attack vector (local) and required user interaction, but with high impact on availability. No known public exploits or active exploitation campaigns have been reported to date. The issue is resolved in NanaZip versions 6.0.1638.0 and 6.5.1638.0, which include fixes to prevent the integer underflow and properly validate header sizes before memory allocation.
Potential Impact
The primary impact of this vulnerability is denial of service, where an attacker can cause the NanaZip application to crash or become unresponsive by supplying a malicious archive file. This can disrupt workflows that rely on NanaZip for file compression and decompression, potentially affecting backup processes, file transfers, or automated archival tasks. While the vulnerability does not directly lead to code execution or data corruption, the resulting application instability can cause operational disruptions. Organizations with users who frequently handle archive files using NanaZip are at risk of service interruptions. Since exploitation requires local access and user interaction, remote exploitation is unlikely, limiting the scope somewhat. However, in environments where NanaZip is used extensively, such as software development, IT operations, or digital forensics, the disruption could be significant. No evidence suggests data confidentiality or integrity is compromised by this vulnerability.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade NanaZip to versions 6.0.1638.0 or later, where the integer underflow issue is fixed. Until upgrades are applied, users should avoid opening archive files from untrusted or unknown sources to reduce the risk of triggering the vulnerability. Implement application whitelisting and endpoint protection to detect and block suspicious archive files. Educate users about the risks of opening files from unverified origins. Additionally, monitor systems for abnormal application crashes or high memory usage related to NanaZip processes, which could indicate attempted exploitation. If upgrading immediately is not feasible, consider restricting NanaZip usage to trusted personnel or sandboxing the application to limit impact. Regularly review and apply vendor patches and security advisories to maintain protection against emerging threats.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, Canada, France, Australia, Netherlands, Sweden
CVE-2026-27710: CWE-191: Integer Underflow (Wrap or Wraparound) in M2Team NanaZip
Description
CVE-2026-27710 is a medium-severity integer underflow vulnerability in the NanaZip open source file archiver affecting versions from 5. 0. 1252. 0 up to but not including 6. 0. 1638. 0 and 6. 5. 1638. 0.
AI-Powered Analysis
Technical Analysis
CVE-2026-27710 is an integer underflow vulnerability classified under CWE-191 found in the NanaZip file archiver software, specifically in its .NET Single File Application parser component. The vulnerability arises when processing a maliciously crafted archive bundle that manipulates the header-size calculation. During this calculation, an integer underflow occurs, causing the software to compute an incorrect, excessively large size for memory allocation. This leads to an unbounded memory allocation attempt which can exhaust system resources or cause the application to crash, resulting in a denial-of-service (DoS) condition. The affected versions include NanaZip releases starting from 5.0.1252.0 up to versions prior to 6.0.1638.0 and 6.5.1638.0. The vulnerability requires the user to open a specially crafted archive file, implying user interaction is necessary, and the attacker must have at least limited privileges on the system (local access). The CVSS 4.0 base score is 5.1, reflecting medium severity due to the limited attack vector (local) and required user interaction, but with high impact on availability. No known public exploits or active exploitation campaigns have been reported to date. The issue is resolved in NanaZip versions 6.0.1638.0 and 6.5.1638.0, which include fixes to prevent the integer underflow and properly validate header sizes before memory allocation.
Potential Impact
The primary impact of this vulnerability is denial of service, where an attacker can cause the NanaZip application to crash or become unresponsive by supplying a malicious archive file. This can disrupt workflows that rely on NanaZip for file compression and decompression, potentially affecting backup processes, file transfers, or automated archival tasks. While the vulnerability does not directly lead to code execution or data corruption, the resulting application instability can cause operational disruptions. Organizations with users who frequently handle archive files using NanaZip are at risk of service interruptions. Since exploitation requires local access and user interaction, remote exploitation is unlikely, limiting the scope somewhat. However, in environments where NanaZip is used extensively, such as software development, IT operations, or digital forensics, the disruption could be significant. No evidence suggests data confidentiality or integrity is compromised by this vulnerability.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade NanaZip to versions 6.0.1638.0 or later, where the integer underflow issue is fixed. Until upgrades are applied, users should avoid opening archive files from untrusted or unknown sources to reduce the risk of triggering the vulnerability. Implement application whitelisting and endpoint protection to detect and block suspicious archive files. Educate users about the risks of opening files from unverified origins. Additionally, monitor systems for abnormal application crashes or high memory usage related to NanaZip processes, which could indicate attempted exploitation. If upgrading immediately is not feasible, consider restricting NanaZip usage to trusted personnel or sandboxing the application to limit impact. Regularly review and apply vendor patches and security advisories to maintain protection against emerging threats.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-23T17:56:51.203Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f8c2fb7ef31ef0b6c21c8
Added to database: 2/25/2026, 11:56:31 PM
Last enriched: 2/26/2026, 12:13:28 AM
Last updated: 2/26/2026, 8:13:10 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.