Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27711: CWE-125: Out-of-bounds Read in M2Team NanaZip

0
Medium
VulnerabilityCVE-2026-27711cvecve-2026-27711cwe-125
Published: Wed Feb 25 2026 (02/25/2026, 23:44:26 UTC)
Source: CVE Database V5
Vendor/Project: M2Team
Product: NanaZip

Description

CVE-2026-27711 is a medium severity out-of-bounds read vulnerability in the UFS parser of M2Team's NanaZip archive software. It affects versions from 5. 0. 1252. 0 up to but not including 6. 0. 1638. 0 and 6. 1 up to but not including 6. 5.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:13:09 UTC

Technical Analysis

CVE-2026-27711 identifies a memory corruption vulnerability classified as CWE-125 (Out-of-bounds Read) in the UFS parser component of NanaZip, an open-source file archiving tool developed by M2Team. The vulnerability exists in versions starting from 5.0.1252.0 up to but excluding 6.0.1638.0 and from 6.1 up to but excluding 6.5.1638.0. The flaw is triggered when the software processes a maliciously crafted archive file with extensions .ufs, .ufs2, or .img. During the normal user workflow of opening or listing archive contents, the parser performs an out-of-bounds memory read, which can cause the application to crash or hang. More critically, this memory corruption could be leveraged to achieve arbitrary code execution or heap corruption, although no public exploits have been reported to date. The vulnerability requires low privileges and user interaction (opening the crafted file), but no authentication. The CVSS v4.0 base score is 5.1, reflecting medium severity due to the local attack vector, low complexity, and potential for high impact on availability. The vulnerability has been addressed in NanaZip versions 6.0.1638.0 and 6.5.1638.0, which include fixes to the UFS parser to prevent out-of-bounds access.

Potential Impact

This vulnerability poses a risk primarily to users and organizations that utilize NanaZip for archive management, especially those handling untrusted or external archive files. Successful exploitation can lead to denial of service via application crashes or hangs, disrupting workflows and potentially causing data loss if the archive operation is critical. More severe exploitation could result in heap corruption, which attackers might leverage to execute arbitrary code within the context of the user running NanaZip. This could lead to further compromise of the host system, data theft, or lateral movement within a network. Since the vulnerability requires user interaction and local privileges, widespread remote exploitation is less likely; however, targeted attacks against users who frequently open untrusted archives are plausible. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits could emerge. Organizations relying on NanaZip in enterprise environments or automated workflows should consider the potential operational impact and security risks.

Mitigation Recommendations

The primary mitigation is to upgrade NanaZip to version 6.0.1638.0 or later, where the vulnerability has been patched. Until upgrades can be applied, organizations should implement strict controls on archive files from untrusted sources, including scanning archives with updated antivirus and endpoint detection tools capable of detecting malformed UFS files. User education is critical to prevent opening suspicious or unsolicited archive files. Employ application whitelisting and sandboxing techniques to limit the impact of potential crashes or exploitation. Monitoring for unusual application behavior or crashes related to NanaZip can help detect exploitation attempts. Additionally, consider restricting the use of NanaZip to trusted users and environments, and if possible, use alternative archive tools that do not parse UFS files or are not affected by this vulnerability. Regularly review and apply security updates from M2Team to maintain protection against emerging threats.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-23T17:56:51.203Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f8c2fb7ef31ef0b6c21cb

Added to database: 2/25/2026, 11:56:31 PM

Last enriched: 2/26/2026, 12:13:09 AM

Last updated: 2/26/2026, 6:33:51 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats