Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3285: Out-of-Bounds Read in berry-lang berry

0
Medium
VulnerabilityCVE-2026-3285cvecve-2026-3285
Published: Fri Feb 27 2026 (02/27/2026, 03:02:13 UTC)
Source: CVE Database V5
Vendor/Project: berry-lang
Product: berry

Description

CVE-2026-3285 is an out-of-bounds read vulnerability in the berry-lang interpreter versions up to 1. 1. 0, specifically in the scan_string function of src/be_lexer. c. This flaw allows a local attacker with low privileges to read memory beyond intended boundaries, potentially leaking sensitive information. Exploitation requires local access but no user interaction or elevated privileges. The vulnerability has a CVSS score of 4. 8, indicating medium severity. A patch has been released to address the issue, and applying it is strongly recommended. There are no known exploits in the wild at this time.

AI-Powered Analysis

AILast updated: 02/27/2026, 03:42:27 UTC

Technical Analysis

CVE-2026-3285 identifies a security vulnerability in the berry-lang interpreter, an embeddable scripting language designed for resource-constrained environments. The vulnerability exists in the scan_string function within the lexer component (src/be_lexer.c) and manifests as an out-of-bounds read condition. This occurs when the function improperly handles string scanning, allowing it to read memory beyond the allocated buffer. The flaw requires local access and low privileges, meaning an attacker must have some level of access to the system but does not require elevated permissions or user interaction to exploit. The out-of-bounds read can lead to unauthorized disclosure of memory contents, potentially exposing sensitive data such as cryptographic keys, passwords, or other confidential information residing in adjacent memory. The vulnerability affects berry-lang versions 1.0 and 1.1.0. The CVSS v4.0 base score is 4.8, reflecting a medium severity level due to the limited attack vector (local access) and the absence of integrity or availability impacts. A patch identified by commit 7149c59a39ba44feca261b12f06089f265fec176 has been released to fix this issue. While no known exploits have been observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation attempts. Organizations embedding berry-lang in their products or using it for scripting should apply the patch promptly to prevent potential data leakage.

Potential Impact

The primary impact of CVE-2026-3285 is the potential unauthorized disclosure of sensitive information due to out-of-bounds memory reads. This can compromise confidentiality by exposing internal memory contents that may include sensitive data such as credentials, cryptographic material, or proprietary information. Since the vulnerability requires local access and low privileges, the risk is somewhat mitigated by the need for an attacker to have initial foothold on the system. However, in environments where berry-lang is embedded in critical systems or used in multi-tenant or shared environments, this vulnerability could facilitate lateral movement or privilege escalation by leaking information useful for further attacks. There is no direct impact on data integrity or system availability. The scope is limited to systems running vulnerable versions of berry-lang, which may be embedded in IoT devices, lightweight applications, or specialized software. Failure to patch could lead to increased risk of data breaches and compromise of system confidentiality in affected environments.

Mitigation Recommendations

To mitigate CVE-2026-3285, organizations should immediately apply the official patch identified by commit 7149c59a39ba44feca261b12f06089f265fec176 or upgrade to a berry-lang version beyond 1.1.0 that includes the fix. Since the vulnerability requires local access, it is critical to enforce strict access controls and limit user privileges to reduce the risk of unauthorized local exploitation. Employing application whitelisting and monitoring for unusual local activity can help detect exploitation attempts. Additionally, conduct code audits and testing on any custom integrations of berry-lang to identify potential misuse of the scan_string function or similar parsing routines. For embedded systems, ensure secure firmware update mechanisms are in place to deploy patches promptly. Network segmentation and endpoint protection can further reduce the attack surface by isolating vulnerable systems. Finally, maintain an inventory of all systems using berry-lang to prioritize patching and risk assessment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-26T16:38:46.941Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a10ed332ffcdb8a2b614ce

Added to database: 2/27/2026, 3:26:11 AM

Last enriched: 2/27/2026, 3:42:27 AM

Last updated: 2/27/2026, 5:30:55 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses