Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4746: CWE-787 Out-of-bounds Write in timeplus-io proton

0
Critical
VulnerabilityCVE-2026-4746cvecve-2026-4746cwe-787
Published: Tue Mar 24 2026 (03/24/2026, 03:28:20 UTC)
Source: CVE Database V5
Vendor/Project: timeplus-io
Product: proton

Description

CVE-2026-4746 is a critical out-of-bounds write vulnerability in the timeplus-io proton software, specifically within the base/poco/Foundation/src modules related to inflate. C. It affects all versions before 1. 6. 16 and can be exploited remotely without authentication or user interaction. The vulnerability allows an attacker to write outside the intended memory bounds, potentially leading to arbitrary code execution, system compromise, or denial of service. No known exploits are currently observed in the wild, but the CVSS 4. 0 score is a maximum 10, indicating extreme severity. Organizations using proton in their environments should prioritize patching once updates are available. The threat is especially relevant to countries with significant deployments of timeplus-io proton, including those with critical infrastructure or software development relying on this product.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 04:45:57 UTC

Technical Analysis

CVE-2026-4746 is a severe out-of-bounds write vulnerability classified under CWE-787, found in the timeplus-io proton software package, specifically in the base/poco/Foundation/src modules associated with the inflate.C program files. This vulnerability exists in all versions prior to 1.6.16. An out-of-bounds write occurs when the software writes data outside the allocated memory buffer, which can corrupt memory, cause crashes, or enable an attacker to execute arbitrary code. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N). The impact on confidentiality, integrity, and availability is high, with potential for full system compromise. The vulnerability's presence in a foundational library module suggests that many dependent applications and systems could be indirectly affected. Although no exploits have been reported in the wild yet, the critical CVSS score of 10 underscores the urgency for remediation. The lack of available patches at the time of reporting means organizations must implement interim mitigations and monitor for suspicious activity. This vulnerability could be leveraged by attackers to gain unauthorized control over affected systems, disrupt services, or steal sensitive data.

Potential Impact

The impact of CVE-2026-4746 is potentially catastrophic for organizations worldwide using the timeplus-io proton software. Successful exploitation can lead to arbitrary code execution, allowing attackers to take full control of affected systems. This can result in data breaches, service disruptions, ransomware deployment, or lateral movement within networks. Given the vulnerability affects a foundational module, the scope of impact extends beyond the proton software itself to any dependent applications or services. The lack of authentication and user interaction requirements makes exploitation easier and increases the attack surface. Critical infrastructure, cloud services, and enterprises relying on proton for data processing or software development are at heightened risk. The vulnerability could also be used as an initial access vector in sophisticated cyberattacks, amplifying its threat. Organizations failing to address this vulnerability promptly may face severe operational, financial, and reputational damages.

Mitigation Recommendations

Until an official patch for proton version 1.6.16 or later is released, organizations should implement the following mitigations: 1) Restrict network access to systems running proton, especially blocking untrusted external traffic to reduce exposure. 2) Employ strict input validation and sanitization on data processed by proton to prevent malformed inputs that could trigger the vulnerability. 3) Use application-layer firewalls or intrusion prevention systems to detect and block suspicious payloads targeting inflate.C functionality. 4) Monitor system logs and behavior for anomalies such as unexpected crashes, memory corruption events, or unusual process activity indicative of exploitation attempts. 5) Isolate critical systems running proton in segmented network zones to limit lateral movement if compromised. 6) Prepare for rapid deployment of patches by maintaining an up-to-date inventory of affected systems and testing updates in controlled environments. 7) Engage with the vendor or community for early access to patches or workarounds. 8) Educate security teams about this vulnerability to enhance detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GovTech CSG
Date Reserved
2026-03-24T03:28:09.194Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c2137bf4197a8e3be10373

Added to database: 3/24/2026, 4:30:51 AM

Last enriched: 3/24/2026, 4:45:57 AM

Last updated: 3/24/2026, 5:36:27 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses