Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28296: Improper Neutralization of CRLF Sequences ('CRLF Injection') in Red Hat Red Hat Enterprise Linux 10

0
Medium
VulnerabilityCVE-2026-28296cvecve-2026-28296
Published: Thu Feb 26 2026 (02/26/2026, 15:10:47 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized sequences allow the attacker to terminate intended FTP commands and inject arbitrary FTP commands, potentially leading to arbitrary code execution or other severe impacts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 16:35:11 UTC

Technical Analysis

CVE-2026-28296 is a vulnerability identified in the FTP GVfs backend component of Red Hat Enterprise Linux 10. The flaw stems from improper input validation where carriage return and line feed (CRLF) sequences are not neutralized in file path inputs. This allows a remote attacker to inject CRLF sequences into FTP commands, effectively terminating legitimate commands prematurely and injecting arbitrary FTP commands. Such command injection could potentially lead to arbitrary code execution or other severe impacts depending on the FTP server's configuration and privileges. The vulnerability is exploitable remotely without requiring authentication but does require user interaction, such as triggering the processing of malicious file paths. The CVSS 3.1 base score is 4.3 (medium), reflecting a network attack vector with low complexity and no privileges required, but limited impact on confidentiality and no impact on integrity or availability. No known exploits have been reported in the wild as of the publication date. The vulnerability highlights a classic CRLF injection scenario where insufficient sanitization of input allows attackers to manipulate protocol commands, a common vector in FTP and HTTP services. Mitigation will likely involve patching the GVfs backend to properly sanitize CRLF characters in file paths and potentially applying additional input validation layers.

Potential Impact

The primary impact of this vulnerability is the potential for remote attackers to inject arbitrary FTP commands by exploiting unsanitized CRLF sequences in file paths. This can lead to unauthorized command execution within the FTP session context, which may allow attackers to manipulate FTP server behavior, access unauthorized files, or escalate attacks depending on server configuration. Although the CVSS score indicates limited confidentiality impact and no integrity or availability impact, the ability to inject commands remotely without authentication poses a risk to organizations relying on Red Hat Enterprise Linux 10 for FTP services. If exploited, this could facilitate further attacks such as data exfiltration, unauthorized file manipulation, or lateral movement within networks. The lack of known exploits in the wild reduces immediate risk, but the vulnerability remains a concern for environments with exposed FTP services or where user interaction with malicious file paths is possible. Organizations with critical FTP infrastructure or those using GVfs extensively should consider this a moderate risk that requires timely remediation.

Mitigation Recommendations

To mitigate CVE-2026-28296, organizations should prioritize applying official patches from Red Hat as soon as they become available to address the input validation flaw in the FTP GVfs backend. In the interim, administrators can restrict or disable FTP GVfs backend usage where feasible to reduce exposure. Implement network-level controls such as firewall rules to limit FTP access to trusted hosts and monitor FTP traffic for anomalous command sequences indicative of CRLF injection attempts. Employ application-layer input validation to sanitize or reject file paths containing CRLF characters before processing. Additionally, consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting CRLF injection patterns in FTP traffic. Educate users about the risks of interacting with untrusted file paths or FTP servers. Regularly audit FTP server configurations and logs for suspicious activity. Finally, maintain an up-to-date inventory of systems running Red Hat Enterprise Linux 10 to ensure timely patch deployment and vulnerability management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-02-26T13:34:41.532Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a06645b7ef31ef0b73ce1c

Added to database: 2/26/2026, 3:27:01 PM

Last enriched: 3/5/2026, 4:35:11 PM

Last updated: 4/12/2026, 6:11:30 PM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses