Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29785: CWE-476: NULL Pointer Dereference in nats-io nats-server

0
High
VulnerabilityCVE-2026-29785cvecve-2026-29785cwe-476
Published: Wed Mar 25 2026 (03/25/2026, 19:38:44 UTC)
Source: CVE Database V5
Vendor/Project: nats-io
Product: nats-server

Description

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash the nats-server by triggering a panic. This happens pre-authentication and requires that compression be enabled (which it is, by default, when leafnodes are used). Versions 2.11.14 and 2.12.5 contain a fix. As a workaround, disable compression on the leafnode port.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 20:16:48 UTC

Technical Analysis

The vulnerability identified as CVE-2026-29785 affects the nats-server component of the nats-io messaging system, specifically when the leafnode feature is enabled and compression is active. Leafnodes are used to connect multiple NATS servers, often in distributed or edge environments, to extend messaging capabilities. The flaw is a NULL pointer dereference (CWE-476) that occurs during the processing of incoming connections on the leafnode port before authentication. Because compression is enabled by default when leafnodes are used, an unauthenticated attacker can send crafted data that triggers a panic in the server, causing it to crash and become unavailable. This vulnerability affects versions earlier than 2.11.14 and versions from 2.12.0-RC.1 up to but not including 2.12.5. The CVSS v3.1 score of 7.5 reflects its high severity due to network attack vector, no required privileges or user interaction, and a direct impact on availability. The vulnerability does not affect confidentiality or integrity but can cause denial of service. The fix involves correcting the NULL pointer dereference in the affected code paths, and updated versions 2.11.14 and 2.12.5 address this issue. In the absence of immediate patching, disabling compression on the leafnode port is an effective workaround to prevent exploitation.

Potential Impact

This vulnerability primarily results in denial of service by crashing the nats-server, which can disrupt messaging infrastructure relying on NATS for cloud-native and edge-native applications. Organizations using nats-server with leafnode enabled may experience service outages, impacting real-time communication, event streaming, and microservices coordination. The unauthenticated nature of the exploit means attackers do not need credentials or user interaction, increasing the risk of widespread disruption. Critical systems depending on high availability messaging, such as financial services, telecommunications, IoT platforms, and cloud providers, could face operational interruptions. While confidentiality and integrity are not directly impacted, the loss of availability can cascade into broader business impacts, including degraded customer experience, delayed processing, and potential financial losses. Given the default enabling of compression with leafnodes, many deployments may be vulnerable if not patched or mitigated.

Mitigation Recommendations

1. Upgrade nats-server to version 2.11.14 or 2.12.5 or later, which contain the fix for this vulnerability. 2. If immediate patching is not feasible, disable compression on the leafnode port as a temporary workaround to prevent the NULL pointer dereference from being triggered. 3. Restrict network access to the leafnode port to trusted sources only, using firewall rules or network segmentation, to reduce exposure to unauthenticated attackers. 4. Monitor nats-server logs and system stability for signs of crashes or unusual connection attempts on the leafnode port. 5. Implement rate limiting or connection throttling on leafnode ports to mitigate potential denial of service attempts. 6. Review and audit configurations to ensure leafnode usage is necessary and properly secured. 7. Stay informed on vendor advisories and apply security patches promptly to maintain resilience.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-04T16:26:02.899Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c43f15f4197a8e3b7dafd6

Added to database: 3/25/2026, 8:01:25 PM

Last enriched: 3/25/2026, 8:16:48 PM

Last updated: 3/26/2026, 5:40:23 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses