Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3606: Out-of-Bounds Read in Ettercap

0
Medium
VulnerabilityCVE-2026-3606cvecve-2026-3606
Published: Thu Mar 05 2026 (03/05/2026, 22:02:07 UTC)
Source: CVE Database V5
Product: Ettercap

Description

CVE-2026-3606 is an out-of-bounds read vulnerability in Ettercap version 0. 8. 4-Garofalo, specifically in the add_data_segment function of the etterfilter component. This flaw requires local access and low privileges to exploit and does not require user interaction. The vulnerability may lead to information disclosure or application instability due to reading memory outside intended bounds. Although the exploit has been publicly disclosed, no known exploits are currently active in the wild, and the vendor has not yet responded with a patch. The CVSS 4. 8 score reflects a medium severity level. Organizations using Ettercap for network analysis or security testing should be aware of this issue and consider mitigation steps to prevent potential exploitation.

AI-Powered Analysis

AILast updated: 03/05/2026, 22:30:57 UTC

Technical Analysis

CVE-2026-3606 is a security vulnerability identified in Ettercap version 0.8.4-Garofalo, a popular open-source network security tool used for man-in-the-middle attacks and network protocol analysis. The vulnerability resides in the add_data_segment function within the etterfilter component, specifically in the source file src/ettercap/utils/etterfilter/ef_output.c. The flaw is an out-of-bounds read, meaning the program reads memory beyond the allocated buffer boundaries. This can lead to unintended information disclosure or cause the application to behave unpredictably, potentially crashing or leaking sensitive data. Exploitation requires local access with low privileges, meaning an attacker must have some level of access to the affected system but does not need elevated permissions or user interaction. The vulnerability was responsibly disclosed early to the project maintainers, but as of the publication date, no patch or response has been provided. The CVSS v4.0 base score of 4.8 reflects a medium severity, considering the attack vector is local, the complexity is low, and no authentication or user interaction is required. No known exploits are currently active in the wild, but the public disclosure increases the risk of future exploitation attempts. Ettercap is widely used by security professionals and penetration testers, so the presence of this vulnerability could impact environments where Ettercap is installed and used.

Potential Impact

The primary impact of CVE-2026-3606 is potential information disclosure or application instability due to out-of-bounds memory reads. While it does not allow remote exploitation or privilege escalation directly, an attacker with local access could leverage this flaw to read sensitive memory contents, which might include credentials, cryptographic keys, or other confidential data. This could undermine the confidentiality of the affected system. Additionally, the vulnerability might cause Ettercap to crash or behave erratically, impacting availability of the tool for legitimate users. Organizations relying on Ettercap for network monitoring or security testing could experience disruptions or data leaks if this vulnerability is exploited. Since Ettercap is often used in security-sensitive environments, the presence of this flaw could weaken overall security posture. The medium severity rating reflects that while the impact is limited to local attackers and does not affect system-wide integrity or availability directly, the confidentiality risks and potential for denial of service are non-negligible.

Mitigation Recommendations

1. Restrict local access to systems running Ettercap to trusted users only, minimizing the risk of local exploitation. 2. Monitor and audit usage of Ettercap binaries to detect unauthorized or suspicious activity. 3. Consider running Ettercap in a sandboxed or containerized environment to limit the impact of potential memory corruption. 4. Until an official patch is released, review the source code of the affected function (add_data_segment in etterfilter) to identify and apply manual code fixes or bounds checking if feasible. 5. Keep Ettercap installations updated and subscribe to vendor or community advisories for patch releases. 6. Employ host-based intrusion detection systems (HIDS) to detect anomalous behavior related to Ettercap processes. 7. Limit the installation of Ettercap to systems where it is strictly necessary, avoiding its presence on general-purpose or high-value servers. 8. Educate local users about the risks of running untrusted code or commands that could exploit this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-05T16:55:18.903Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69aa00a5c48b3f10ff7ae786

Added to database: 3/5/2026, 10:16:05 PM

Last enriched: 3/5/2026, 10:30:57 PM

Last updated: 3/6/2026, 12:56:54 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses