Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31839: CWE-354: Improper Validation of Integrity Check Value in striae-org striae

0
High
VulnerabilityCVE-2026-31839cvecve-2026-31839cwe-354
Published: Wed Mar 11 2026 (03/11/2026, 16:46:22 UTC)
Source: CVE Database V5
Vendor/Project: striae-org
Product: striae

Description

Striae is a firearms examiner's comparison companion. A high-severity integrity bypass vulnerability existed in Striae's digital confirmation workflow prior to v3.0.0. Hash-only validation trusted manifest hash fields that could be modified together with package content, allowing tampered confirmation packages to pass integrity checks. This vulnerability is fixed in 3.0.0.

AI-Powered Analysis

AILast updated: 03/11/2026, 17:14:05 UTC

Technical Analysis

Striae is a specialized software tool used by firearms examiners to assist in the comparison of ballistic evidence. Prior to version 3.0.0, Striae contained a critical vulnerability (CVE-2026-31839) classified under CWE-354 (Improper Validation of Integrity Check Value). The vulnerability arises from the software's digital confirmation workflow, which relied solely on hash validation of manifest fields to verify package integrity. However, the manifest hash fields themselves could be modified in conjunction with the package content, effectively allowing an attacker to craft malicious or tampered confirmation packages that would pass integrity checks undetected. This flaw undermines the fundamental trustworthiness of the forensic data processed by Striae, potentially leading to false confirmations or acceptance of altered evidence. The CVSS v3.1 base score is 8.2 (high severity), reflecting the significant impact on confidentiality and integrity, with an attack vector requiring local access and user interaction but no privileges. The scope is changed (S:C) because the vulnerability affects the integrity of data across components. The vulnerability was publicly disclosed on March 11, 2026, and fixed in Striae version 3.0.0. No public exploits have been reported, but the risk remains substantial given the critical nature of forensic evidence validation.

Potential Impact

The primary impact of this vulnerability is the compromise of data integrity and confidentiality within forensic firearm examination workflows. Attackers who can exploit this flaw may introduce tampered or falsified confirmation packages that appear legitimate, potentially leading to incorrect forensic conclusions. This can undermine legal proceedings, damage the credibility of forensic labs, and result in wrongful convictions or acquittals. Since Striae is used in sensitive law enforcement and forensic contexts, the integrity of its outputs is paramount. Although availability is not affected, the breach of trust in data integrity can have severe operational and reputational consequences for organizations worldwide. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk, especially in environments where insiders or compromised users have access to the system.

Mitigation Recommendations

Organizations using Striae should immediately upgrade to version 3.0.0 or later, where this vulnerability is fixed. Until upgrade is possible, restrict access to systems running vulnerable versions to trusted personnel only and implement strict user access controls to minimize the risk of local exploitation. Employ monitoring and auditing of package confirmation workflows to detect anomalies or unexpected modifications. Consider implementing additional cryptographic verification mechanisms outside of Striae's native validation to cross-check package integrity. Educate users about the risk of accepting confirmation packages without proper verification and enforce policies requiring verification of software version and patch status. Regularly review forensic software supply chains and update incident response plans to include scenarios involving tampered forensic data.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T17:41:56.078Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b19f882f860ef9434a76cf

Added to database: 3/11/2026, 4:59:52 PM

Last enriched: 3/11/2026, 5:14:05 PM

Last updated: 3/11/2026, 10:15:21 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses