Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32854: CWE-476 NULL pointer dereference in LibVNC LibVNCServer

0
Medium
VulnerabilityCVE-2026-32854cvecve-2026-32854cwe-476
Published: Tue Mar 24 2026 (03/24/2026, 17:31:32 UTC)
Source: CVE Database V5
Vendor/Project: LibVNC
Product: LibVNCServer

Description

LibVNCServer versions 0.9.15 and prior (fixed in commit dc78dee) contain null pointer dereference vulnerabilities in the HTTP proxy handlers within httpProcessInput() in httpd.c that allow remote attackers to cause a denial of service by sending specially crafted HTTP requests. Attackers can exploit missing validation of strchr() return values in the CONNECT and GET proxy handling paths to trigger null pointer dereferences and crash the server when httpd and proxy features are enabled.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 19:48:14 UTC

Technical Analysis

CVE-2026-32854 is a null pointer dereference vulnerability identified in LibVNCServer versions 0.9.15 and prior, specifically within the HTTP proxy handlers implemented in the httpProcessInput() function of the httpd.c source file. The vulnerability arises due to missing validation of the return value from the strchr() function, which is used to parse HTTP CONNECT and GET requests in proxy handling paths. When strchr() returns NULL (indicating the searched character was not found), subsequent dereferencing leads to a null pointer dereference, causing the server process to crash. This results in a denial of service condition. The vulnerability can be triggered remotely by sending specially crafted HTTP requests to a LibVNCServer instance with HTTP proxy and httpd features enabled. Exploitation does not require authentication or user interaction, increasing the risk of automated attacks. The issue was resolved in a commit identified as dc78dee, which added proper validation checks to prevent null pointer dereferences. Although no known exploits have been reported in the wild, the vulnerability's presence in a widely used VNC server library that supports proxying makes it a concern for environments relying on remote desktop and remote access solutions based on LibVNCServer.

Potential Impact

The primary impact of CVE-2026-32854 is denial of service, where an attacker can remotely crash the LibVNCServer process by sending malformed HTTP proxy requests. This can disrupt remote desktop services and any dependent applications or workflows, potentially causing operational downtime. Organizations that rely on LibVNCServer for remote access, especially those enabling HTTP proxy features, may experience service interruptions, impacting productivity and availability. While this vulnerability does not allow code execution or data compromise, the loss of availability can be critical in environments requiring continuous remote access, such as IT support, cloud services, and industrial control systems. The ease of exploitation without authentication increases the risk of automated or opportunistic attacks, potentially affecting large-scale deployments. No known exploits in the wild reduce immediate risk, but the vulnerability should be addressed proactively to prevent future exploitation.

Mitigation Recommendations

To mitigate CVE-2026-32854, organizations should upgrade LibVNCServer to a version that includes the fix from commit dc78dee or later. If immediate upgrading is not possible, disabling HTTP proxy and httpd features within LibVNCServer can prevent exploitation by removing the vulnerable code paths. Network-level controls such as firewall rules or intrusion prevention systems should be configured to restrict access to the LibVNCServer HTTP proxy ports, limiting exposure to untrusted networks. Monitoring and logging HTTP requests to detect unusual or malformed CONNECT and GET requests can help identify attempted exploitation. Additionally, implementing rate limiting on proxy requests may reduce the risk of denial of service attacks. Regularly reviewing and applying vendor security advisories and patches is essential to maintain protection against similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-16T18:11:41.759Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2cdd9f4197a8e3b58a8a5

Added to database: 3/24/2026, 5:46:01 PM

Last enriched: 3/31/2026, 7:48:14 PM

Last updated: 5/7/2026, 4:22:57 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses