Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27711: CWE-125: Out-of-bounds Read in M2Team NanaZip

0
Medium
VulnerabilityCVE-2026-27711cvecve-2026-27711cwe-125
Published: Wed Feb 25 2026 (02/25/2026, 23:44:26 UTC)
Source: CVE Database V5
Vendor/Project: M2Team
Product: NanaZip

Description

NanaZip is an open source file archive. Starting in version 5.0.1252.0 and prior to versions 6.0.1638.0 and 6.5.1638.0, a memory corruption vulnerability in NanaZip’s UFS parser allows a crafted `.ufs/.ufs2/.img` file to trigger out-of-bounds memory access during archive open/listing. The bug is reachable via normal user file-open flow and can cause process crash, hang, and potentially exploitable heap corruption. Versions 6.0.1638.0 and 6.5.1638.0 fix the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:27:41 UTC

Technical Analysis

CVE-2026-27711 is an out-of-bounds read vulnerability classified under CWE-125 found in the UFS filesystem parser component of NanaZip, an open-source file archiving tool. The vulnerability exists in versions starting from 5.0.1252.0 up to but excluding 6.0.1638.0 and 6.5.1638.0. When a user opens or lists the contents of a specially crafted archive file with extensions .ufs, .ufs2, or .img, the parser performs an out-of-bounds memory read due to improper bounds checking. This memory corruption can lead to process instability such as crashes or hangs, and potentially heap corruption that might be exploited to execute arbitrary code or escalate privileges. The attack vector is local, requiring the user to open a malicious archive file, and the attacker needs low privileges with no authentication required. The vulnerability does not affect confidentiality or integrity directly but impacts availability and potentially integrity if exploited for code execution. The issue is fixed in NanaZip versions 6.0.1638.0 and 6.5.1638.0. No public exploits or active exploitation have been reported to date.

Potential Impact

The primary impact of CVE-2026-27711 is on the availability and integrity of systems running vulnerable versions of NanaZip. Successful exploitation can cause application crashes or hangs, disrupting normal file archiving operations. More critically, the heap corruption potential could allow attackers to execute arbitrary code within the context of the user running NanaZip, leading to privilege escalation or further system compromise. Organizations relying on NanaZip for file extraction or archiving, especially in environments where users frequently handle untrusted archive files, face risks of denial of service and potential malware execution. Although the attack requires user interaction and local access, the widespread use of NanaZip on Windows platforms for archive management means many endpoints could be exposed. The absence of known exploits reduces immediate risk, but the vulnerability presents a moderate threat that could be leveraged in targeted attacks or malware campaigns.

Mitigation Recommendations

To mitigate CVE-2026-27711, organizations should immediately upgrade NanaZip to versions 6.0.1638.0 or later, where the vulnerability is patched. Until upgrades can be deployed, users should be trained to avoid opening archive files from untrusted or unknown sources, especially those with .ufs, .ufs2, or .img extensions. Implement endpoint protection solutions with heuristic and behavioral detection to identify suspicious archive file handling or crashes. Employ application whitelisting and sandboxing techniques to limit the impact of potential exploitation. Regularly audit and monitor logs for abnormal application crashes or hangs related to NanaZip. Additionally, consider restricting the use of NanaZip to trusted users or systems and use alternative archive tools with no known vulnerabilities in sensitive environments. Maintain an up-to-date inventory of software versions to ensure timely patching of vulnerable components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-23T17:56:51.203Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f8c2fb7ef31ef0b6c21cb

Added to database: 2/25/2026, 11:56:31 PM

Last enriched: 3/5/2026, 11:27:41 AM

Last updated: 4/12/2026, 11:16:06 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses