CVE-2026-32877: CWE-125: Out-of-bounds Read in randombit botan
CVE-2026-32877 is a high-severity vulnerability in the Botan C++ cryptography library versions 2. 3. 0 up to but not including 3. 11. 0. The issue occurs during SM2 decryption where the authentication code (C3) length is not properly validated before comparison. This can lead to an out-of-bounds heap read of up to 31 bytes when processing invalid ciphertexts, potentially causing a crash or other undefined behavior. The vulnerability has been addressed in Botan version 3. 11. 0.
AI Analysis
Technical Summary
Botan versions from 2.3.0 to before 3.11.0 contain an out-of-bounds read vulnerability (CWE-125) in the SM2 decryption implementation. Specifically, the code verifying the authentication code value (C3) does not check that the encoded value is of the expected length before performing a comparison. This flaw allows an attacker to trigger a heap over-read of up to 31 bytes by supplying crafted invalid ciphertexts. The vulnerability can result in application crashes or other undefined behavior. The issue is fixed in version 3.11.0 of Botan.
Potential Impact
An attacker can cause a heap over-read of up to 31 bytes by providing invalid ciphertext during SM2 decryption, which may lead to application crashes or other undefined behavior. The confidentiality impact is limited (low), but availability can be affected due to crashes. There is no indication of known exploits in the wild.
Mitigation Recommendations
Upgrade to Botan version 3.11.0 or later, where this vulnerability is patched. Since this is a library vulnerability, applying the official fix by updating the library version is the recommended remediation. Patch status is confirmed by the vendor advisory stating the issue is fixed in version 3.11.0.
CVE-2026-32877: CWE-125: Out-of-bounds Read in randombit botan
Description
CVE-2026-32877 is a high-severity vulnerability in the Botan C++ cryptography library versions 2. 3. 0 up to but not including 3. 11. 0. The issue occurs during SM2 decryption where the authentication code (C3) length is not properly validated before comparison. This can lead to an out-of-bounds heap read of up to 31 bytes when processing invalid ciphertexts, potentially causing a crash or other undefined behavior. The vulnerability has been addressed in Botan version 3. 11. 0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Botan versions from 2.3.0 to before 3.11.0 contain an out-of-bounds read vulnerability (CWE-125) in the SM2 decryption implementation. Specifically, the code verifying the authentication code value (C3) does not check that the encoded value is of the expected length before performing a comparison. This flaw allows an attacker to trigger a heap over-read of up to 31 bytes by supplying crafted invalid ciphertexts. The vulnerability can result in application crashes or other undefined behavior. The issue is fixed in version 3.11.0 of Botan.
Potential Impact
An attacker can cause a heap over-read of up to 31 bytes by providing invalid ciphertext during SM2 decryption, which may lead to application crashes or other undefined behavior. The confidentiality impact is limited (low), but availability can be affected due to crashes. There is no indication of known exploits in the wild.
Mitigation Recommendations
Upgrade to Botan version 3.11.0 or later, where this vulnerability is patched. Since this is a library vulnerability, applying the official fix by updating the library version is the recommended remediation. Patch status is confirmed by the vendor advisory stating the issue is fixed in version 3.11.0.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-16T21:03:44.420Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cae2bce6bfc5ba1d6c3e42
Added to database: 3/30/2026, 8:53:16 PM
Last enriched: 4/7/2026, 10:53:07 AM
Last updated: 5/15/2026, 12:23:40 PM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.