CVE-2026-29785: CWE-476: NULL Pointer Dereference in nats-io nats-server
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash the nats-server by triggering a panic. This happens pre-authentication and requires that compression be enabled (which it is, by default, when leafnodes are used). Versions 2.11.14 and 2.12.5 contain a fix. As a workaround, disable compression on the leafnode port.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-29785 affects the nats-server component of the nats-io messaging system, specifically when the leafnode feature is enabled and compression is active. Leafnodes are used to connect multiple NATS servers, often in distributed or edge environments, to extend messaging capabilities. The flaw is a NULL pointer dereference (CWE-476) that occurs during the processing of incoming connections on the leafnode port before authentication. Because compression is enabled by default when leafnodes are used, an unauthenticated attacker can send crafted data that triggers a panic in the server, causing it to crash and become unavailable. This vulnerability affects versions earlier than 2.11.14 and versions from 2.12.0-RC.1 up to but not including 2.12.5. The CVSS v3.1 score of 7.5 reflects its high severity due to network attack vector, no required privileges or user interaction, and a direct impact on availability. The vulnerability does not affect confidentiality or integrity but can cause denial of service. The fix involves correcting the NULL pointer dereference in the affected code paths, and updated versions 2.11.14 and 2.12.5 address this issue. In the absence of immediate patching, disabling compression on the leafnode port is an effective workaround to prevent exploitation.
Potential Impact
This vulnerability primarily results in denial of service by crashing the nats-server, which can disrupt messaging infrastructure relying on NATS for cloud-native and edge-native applications. Organizations using nats-server with leafnode enabled may experience service outages, impacting real-time communication, event streaming, and microservices coordination. The unauthenticated nature of the exploit means attackers do not need credentials or user interaction, increasing the risk of widespread disruption. Critical systems depending on high availability messaging, such as financial services, telecommunications, IoT platforms, and cloud providers, could face operational interruptions. While confidentiality and integrity are not directly impacted, the loss of availability can cascade into broader business impacts, including degraded customer experience, delayed processing, and potential financial losses. Given the default enabling of compression with leafnodes, many deployments may be vulnerable if not patched or mitigated.
Mitigation Recommendations
1. Upgrade nats-server to version 2.11.14 or 2.12.5 or later, which contain the fix for this vulnerability. 2. If immediate patching is not feasible, disable compression on the leafnode port as a temporary workaround to prevent the NULL pointer dereference from being triggered. 3. Restrict network access to the leafnode port to trusted sources only, using firewall rules or network segmentation, to reduce exposure to unauthenticated attackers. 4. Monitor nats-server logs and system stability for signs of crashes or unusual connection attempts on the leafnode port. 5. Implement rate limiting or connection throttling on leafnode ports to mitigate potential denial of service attempts. 6. Review and audit configurations to ensure leafnode usage is necessary and properly secured. 7. Stay informed on vendor advisories and apply security patches promptly to maintain resilience.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, Canada, Australia, Netherlands, France, Singapore
CVE-2026-29785: CWE-476: NULL Pointer Dereference in nats-io nats-server
Description
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash the nats-server by triggering a panic. This happens pre-authentication and requires that compression be enabled (which it is, by default, when leafnodes are used). Versions 2.11.14 and 2.12.5 contain a fix. As a workaround, disable compression on the leafnode port.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-29785 affects the nats-server component of the nats-io messaging system, specifically when the leafnode feature is enabled and compression is active. Leafnodes are used to connect multiple NATS servers, often in distributed or edge environments, to extend messaging capabilities. The flaw is a NULL pointer dereference (CWE-476) that occurs during the processing of incoming connections on the leafnode port before authentication. Because compression is enabled by default when leafnodes are used, an unauthenticated attacker can send crafted data that triggers a panic in the server, causing it to crash and become unavailable. This vulnerability affects versions earlier than 2.11.14 and versions from 2.12.0-RC.1 up to but not including 2.12.5. The CVSS v3.1 score of 7.5 reflects its high severity due to network attack vector, no required privileges or user interaction, and a direct impact on availability. The vulnerability does not affect confidentiality or integrity but can cause denial of service. The fix involves correcting the NULL pointer dereference in the affected code paths, and updated versions 2.11.14 and 2.12.5 address this issue. In the absence of immediate patching, disabling compression on the leafnode port is an effective workaround to prevent exploitation.
Potential Impact
This vulnerability primarily results in denial of service by crashing the nats-server, which can disrupt messaging infrastructure relying on NATS for cloud-native and edge-native applications. Organizations using nats-server with leafnode enabled may experience service outages, impacting real-time communication, event streaming, and microservices coordination. The unauthenticated nature of the exploit means attackers do not need credentials or user interaction, increasing the risk of widespread disruption. Critical systems depending on high availability messaging, such as financial services, telecommunications, IoT platforms, and cloud providers, could face operational interruptions. While confidentiality and integrity are not directly impacted, the loss of availability can cascade into broader business impacts, including degraded customer experience, delayed processing, and potential financial losses. Given the default enabling of compression with leafnodes, many deployments may be vulnerable if not patched or mitigated.
Mitigation Recommendations
1. Upgrade nats-server to version 2.11.14 or 2.12.5 or later, which contain the fix for this vulnerability. 2. If immediate patching is not feasible, disable compression on the leafnode port as a temporary workaround to prevent the NULL pointer dereference from being triggered. 3. Restrict network access to the leafnode port to trusted sources only, using firewall rules or network segmentation, to reduce exposure to unauthenticated attackers. 4. Monitor nats-server logs and system stability for signs of crashes or unusual connection attempts on the leafnode port. 5. Implement rate limiting or connection throttling on leafnode ports to mitigate potential denial of service attempts. 6. Review and audit configurations to ensure leafnode usage is necessary and properly secured. 7. Stay informed on vendor advisories and apply security patches promptly to maintain resilience.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-04T16:26:02.899Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c43f15f4197a8e3b7dafd6
Added to database: 3/25/2026, 8:01:25 PM
Last enriched: 3/25/2026, 8:16:48 PM
Last updated: 3/26/2026, 5:40:23 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.