CVE-2026-27711: CWE-125: Out-of-bounds Read in M2Team NanaZip
NanaZip is an open source file archive. Starting in version 5.0.1252.0 and prior to versions 6.0.1638.0 and 6.5.1638.0, a memory corruption vulnerability in NanaZip’s UFS parser allows a crafted `.ufs/.ufs2/.img` file to trigger out-of-bounds memory access during archive open/listing. The bug is reachable via normal user file-open flow and can cause process crash, hang, and potentially exploitable heap corruption. Versions 6.0.1638.0 and 6.5.1638.0 fix the issue.
AI Analysis
Technical Summary
CVE-2026-27711 is an out-of-bounds read vulnerability classified under CWE-125 found in the UFS filesystem parser component of NanaZip, an open-source file archiving tool. The vulnerability exists in versions starting from 5.0.1252.0 up to but excluding 6.0.1638.0 and 6.5.1638.0. When a user opens or lists the contents of a specially crafted archive file with extensions .ufs, .ufs2, or .img, the parser performs an out-of-bounds memory read due to improper bounds checking. This memory corruption can lead to process instability such as crashes or hangs, and potentially heap corruption that might be exploited to execute arbitrary code or escalate privileges. The attack vector is local, requiring the user to open a malicious archive file, and the attacker needs low privileges with no authentication required. The vulnerability does not affect confidentiality or integrity directly but impacts availability and potentially integrity if exploited for code execution. The issue is fixed in NanaZip versions 6.0.1638.0 and 6.5.1638.0. No public exploits or active exploitation have been reported to date.
Potential Impact
The primary impact of CVE-2026-27711 is on the availability and integrity of systems running vulnerable versions of NanaZip. Successful exploitation can cause application crashes or hangs, disrupting normal file archiving operations. More critically, the heap corruption potential could allow attackers to execute arbitrary code within the context of the user running NanaZip, leading to privilege escalation or further system compromise. Organizations relying on NanaZip for file extraction or archiving, especially in environments where users frequently handle untrusted archive files, face risks of denial of service and potential malware execution. Although the attack requires user interaction and local access, the widespread use of NanaZip on Windows platforms for archive management means many endpoints could be exposed. The absence of known exploits reduces immediate risk, but the vulnerability presents a moderate threat that could be leveraged in targeted attacks or malware campaigns.
Mitigation Recommendations
To mitigate CVE-2026-27711, organizations should immediately upgrade NanaZip to versions 6.0.1638.0 or later, where the vulnerability is patched. Until upgrades can be deployed, users should be trained to avoid opening archive files from untrusted or unknown sources, especially those with .ufs, .ufs2, or .img extensions. Implement endpoint protection solutions with heuristic and behavioral detection to identify suspicious archive file handling or crashes. Employ application whitelisting and sandboxing techniques to limit the impact of potential exploitation. Regularly audit and monitor logs for abnormal application crashes or hangs related to NanaZip. Additionally, consider restricting the use of NanaZip to trusted users or systems and use alternative archive tools with no known vulnerabilities in sensitive environments. Maintain an up-to-date inventory of software versions to ensure timely patching of vulnerable components.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, Canada, France, Australia, Netherlands, Sweden
CVE-2026-27711: CWE-125: Out-of-bounds Read in M2Team NanaZip
Description
NanaZip is an open source file archive. Starting in version 5.0.1252.0 and prior to versions 6.0.1638.0 and 6.5.1638.0, a memory corruption vulnerability in NanaZip’s UFS parser allows a crafted `.ufs/.ufs2/.img` file to trigger out-of-bounds memory access during archive open/listing. The bug is reachable via normal user file-open flow and can cause process crash, hang, and potentially exploitable heap corruption. Versions 6.0.1638.0 and 6.5.1638.0 fix the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27711 is an out-of-bounds read vulnerability classified under CWE-125 found in the UFS filesystem parser component of NanaZip, an open-source file archiving tool. The vulnerability exists in versions starting from 5.0.1252.0 up to but excluding 6.0.1638.0 and 6.5.1638.0. When a user opens or lists the contents of a specially crafted archive file with extensions .ufs, .ufs2, or .img, the parser performs an out-of-bounds memory read due to improper bounds checking. This memory corruption can lead to process instability such as crashes or hangs, and potentially heap corruption that might be exploited to execute arbitrary code or escalate privileges. The attack vector is local, requiring the user to open a malicious archive file, and the attacker needs low privileges with no authentication required. The vulnerability does not affect confidentiality or integrity directly but impacts availability and potentially integrity if exploited for code execution. The issue is fixed in NanaZip versions 6.0.1638.0 and 6.5.1638.0. No public exploits or active exploitation have been reported to date.
Potential Impact
The primary impact of CVE-2026-27711 is on the availability and integrity of systems running vulnerable versions of NanaZip. Successful exploitation can cause application crashes or hangs, disrupting normal file archiving operations. More critically, the heap corruption potential could allow attackers to execute arbitrary code within the context of the user running NanaZip, leading to privilege escalation or further system compromise. Organizations relying on NanaZip for file extraction or archiving, especially in environments where users frequently handle untrusted archive files, face risks of denial of service and potential malware execution. Although the attack requires user interaction and local access, the widespread use of NanaZip on Windows platforms for archive management means many endpoints could be exposed. The absence of known exploits reduces immediate risk, but the vulnerability presents a moderate threat that could be leveraged in targeted attacks or malware campaigns.
Mitigation Recommendations
To mitigate CVE-2026-27711, organizations should immediately upgrade NanaZip to versions 6.0.1638.0 or later, where the vulnerability is patched. Until upgrades can be deployed, users should be trained to avoid opening archive files from untrusted or unknown sources, especially those with .ufs, .ufs2, or .img extensions. Implement endpoint protection solutions with heuristic and behavioral detection to identify suspicious archive file handling or crashes. Employ application whitelisting and sandboxing techniques to limit the impact of potential exploitation. Regularly audit and monitor logs for abnormal application crashes or hangs related to NanaZip. Additionally, consider restricting the use of NanaZip to trusted users or systems and use alternative archive tools with no known vulnerabilities in sensitive environments. Maintain an up-to-date inventory of software versions to ensure timely patching of vulnerable components.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-23T17:56:51.203Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f8c2fb7ef31ef0b6c21cb
Added to database: 2/25/2026, 11:56:31 PM
Last enriched: 3/5/2026, 11:27:41 AM
Last updated: 4/12/2026, 11:16:06 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.