Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32854: CWE-476 NULL pointer dereference in LibVNC LibVNCServer

0
Medium
VulnerabilityCVE-2026-32854cvecve-2026-32854cwe-476
Published: Tue Mar 24 2026 (03/24/2026, 17:31:32 UTC)
Source: CVE Database V5
Vendor/Project: LibVNC
Product: LibVNCServer

Description

CVE-2026-32854 is a medium severity vulnerability in LibVNCServer versions 0. 9. 15 and earlier, involving null pointer dereference in HTTP proxy handlers. The flaw exists in the httpProcessInput() function within httpd. c, where improper validation of strchr() return values in CONNECT and GET proxy handling paths allows remote attackers to cause a denial of service by crashing the server. Exploitation requires no authentication or user interaction and can be triggered by sending specially crafted HTTP requests when both httpd and proxy features are enabled. Although no known exploits are currently reported in the wild, affected systems remain vulnerable until patched. This vulnerability impacts the availability of services relying on LibVNCServer's HTTP proxy functionality. Organizations using vulnerable versions should prioritize updating to fixed versions or apply mitigations to prevent exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 18:03:23 UTC

Technical Analysis

CVE-2026-32854 is a null pointer dereference vulnerability identified in LibVNCServer, an open-source library used to implement VNC server functionality. The issue resides in the HTTP proxy handlers within the httpProcessInput() function in the httpd.c source file. Specifically, the vulnerability arises from missing validation of the return value of the strchr() function during the processing of CONNECT and GET HTTP proxy requests. When strchr() returns NULL, subsequent dereferencing leads to a null pointer dereference, causing the server process to crash and resulting in a denial of service (DoS). This flaw affects LibVNCServer versions up to 0.9.15 and was addressed in a commit identified as dc78dee. Exploitation is possible remotely without authentication or user interaction, provided that the vulnerable server has both httpd and proxy features enabled. The vulnerability is classified under CWE-476 (NULL Pointer Dereference) and has a CVSS v4.0 base score of 6.3, indicating a medium severity level. No public exploits have been reported to date, but the vulnerability could be leveraged by attackers to disrupt services dependent on LibVNCServer's HTTP proxy capabilities.

Potential Impact

The primary impact of CVE-2026-32854 is a denial of service condition caused by crashing the LibVNCServer process. This can lead to temporary or prolonged unavailability of VNC services that utilize the HTTP proxy feature, potentially disrupting remote desktop access and management operations. Organizations relying on LibVNCServer for remote access or embedded in other products may experience service interruptions, affecting operational continuity. While the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can hinder incident response, remote administration, and user productivity. The ease of exploitation without authentication and user interaction increases the risk, especially in environments where the vulnerable service is exposed to untrusted networks. Although no known exploits are currently active, the vulnerability represents a moderate risk that should be addressed promptly to avoid potential service outages.

Mitigation Recommendations

To mitigate CVE-2026-32854, organizations should upgrade LibVNCServer to a version that includes the fix introduced in commit dc78dee or later. If immediate upgrading is not feasible, administrators should consider disabling the HTTP proxy feature or the httpd server functionality within LibVNCServer to eliminate the attack surface. Network-level controls such as firewall rules can restrict access to the vulnerable service, limiting exposure to trusted hosts only. Implementing intrusion detection or prevention systems to monitor for anomalous HTTP CONNECT or GET requests targeting the proxy handlers can provide early warning of exploitation attempts. Regularly auditing and monitoring logs for unexpected crashes or restarts of the LibVNCServer process can help detect exploitation. Finally, maintaining an up-to-date inventory of software versions and applying security patches promptly will reduce the window of vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-16T18:11:41.759Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2cdd9f4197a8e3b58a8a5

Added to database: 3/24/2026, 5:46:01 PM

Last enriched: 3/24/2026, 6:03:23 PM

Last updated: 3/24/2026, 6:47:49 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses