Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32853: CWE-125 Out-of-bounds read in LibVNC LibVNCServer

0
Medium
VulnerabilityCVE-2026-32853cvecve-2026-32853cwe-125
Published: Tue Mar 24 2026 (03/24/2026, 17:30:40 UTC)
Source: CVE Database V5
Vendor/Project: LibVNC
Product: LibVNCServer

Description

CVE-2026-32853 is a heap out-of-bounds read vulnerability in LibVNCServer versions 0. 9. 15 and earlier, specifically in the UltraZip encoding handler. The flaw arises from improper bounds checking in the HandleUltraZipBPP() function, allowing a malicious VNC server to manipulate subrectangle header counts to read beyond allocated heap buffers. Exploitation can lead to information disclosure or application crashes without requiring authentication or user interaction. The vulnerability has a CVSS 4. 0 score of 6. 9, indicating medium severity. No known exploits are currently in the wild, and a fix was introduced after version 0. 9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 18:03:46 UTC

Technical Analysis

CVE-2026-32853 is a medium-severity vulnerability identified in LibVNCServer, an open-source library widely used to implement VNC server functionality. The vulnerability exists in versions 0.9.15 and prior, specifically within the UltraZip encoding handler's HandleUltraZipBPP() function. This function processes subrectangle header counts during the decoding of UltraZip-encoded data streams. Due to insufficient bounds checking, a malicious VNC server can craft malformed UltraZip data with manipulated subrectangle header counts that cause the function to read beyond the allocated heap buffer. This out-of-bounds read can result in the disclosure of sensitive memory contents or cause the application to crash, leading to denial of service. The vulnerability does not require any authentication or user interaction, making it remotely exploitable by any attacker able to establish a VNC connection. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality and availability (VC:L, VA:L) with no impact on integrity or scope changes. Although no exploits are currently known in the wild, the flaw poses a risk to any system running vulnerable LibVNCServer versions, particularly in environments where VNC servers connect to untrusted clients or servers. The issue was fixed in a commit after version 0.9.15, so upgrading to the latest version is critical. The vulnerability is tracked under CWE-125 (Out-of-bounds Read), a common memory safety issue that can lead to information leakage or crashes.

Potential Impact

The primary impact of CVE-2026-32853 is information disclosure and potential denial of service via application crashes. Attackers can exploit this vulnerability remotely without authentication or user interaction, increasing the risk profile. Sensitive memory contents may be exposed, potentially leaking credentials, cryptographic keys, or other confidential data residing in process memory. Application crashes can disrupt remote desktop services, affecting availability and operational continuity. Organizations relying on LibVNCServer for remote access, remote management, or embedded systems may face increased risk of data leakage or service interruptions. While the vulnerability does not allow code execution or privilege escalation, the information disclosure could facilitate further attacks. The medium CVSS score reflects moderate risk, but the ease of exploitation and network accessibility elevate the threat. Industries with critical infrastructure, managed service providers, and enterprises using VNC-based remote control tools are particularly vulnerable. The absence of known exploits suggests limited current exploitation but does not preclude future attacks.

Mitigation Recommendations

To mitigate CVE-2026-32853, organizations should immediately upgrade LibVNCServer to versions released after 0.9.15 that include the fix for this vulnerability. If upgrading is not immediately feasible, applying any available patches or backported fixes from trusted sources is essential. Network-level controls should be implemented to restrict VNC traffic to trusted hosts and networks, minimizing exposure to untrusted or malicious VNC servers. Employing VPNs or encrypted tunnels for VNC connections can reduce the risk of interception and manipulation. Monitoring VNC server logs for unusual connection patterns or malformed packets may help detect exploitation attempts. Additionally, consider disabling or restricting the UltraZip encoding handler if it is not required, as this reduces the attack surface. Regularly auditing and updating remote access tools and libraries is critical to maintaining security. Finally, implement memory protection mechanisms and runtime application self-protection (RASP) where possible to mitigate the impact of memory safety vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-16T18:11:41.759Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2cdd9f4197a8e3b58a89d

Added to database: 3/24/2026, 5:46:01 PM

Last enriched: 3/24/2026, 6:03:46 PM

Last updated: 3/24/2026, 7:50:44 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses