Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-4747
PUBLISHED
More InfoOfficial Page
Assigner-freebsd
Assigner Org ID-63664ac6-956c-4cba-a5d0-f46076e16109
View Known Exploited Vulnerability (KEV) details
Published At-26 Mar, 2026 | 06:21
Updated At-02 Apr, 2026 | 03:55
Rejected At-
▼CVE Numbering Authority (CNA)
Remote code execution via RPCSEC_GSS packet validation

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel. In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system.

Affected Products
Vendor
FreeBSD FoundationFreeBSD
Product
FreeBSD
Modules
  • rpcsec_gss
Default Status
unknown
Versions
Affected
  • From 15.0-RELEASE before p5 (release)
  • From 14.4-RELEASE before p1 (release)
  • From 14.3-RELEASE before p10 (release)
  • From 13.5-RELEASE before p11 (release)
Problem Types
TypeCWE IDDescription
CWECWE-121CWE-121: Stack-based Buffer Overflow
Type: CWE
CWE ID: CWE-121
Description: CWE-121: Stack-based Buffer Overflow
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Nicholas Carlini using Claude, Anthropic
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://security.freebsd.org/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc
vendor-advisory
Hyperlink: https://security.freebsd.org/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/califio/publications/blob/main/MADBugs/CVE-2026-4747/exploit.py
exploit
Hyperlink: https://github.com/califio/publications/blob/main/MADBugs/CVE-2026-4747/exploit.py
Resource:
exploit
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/califio/publications/tree/main/MADBugs/CVE-2026-4747
N/A
Hyperlink: https://github.com/califio/publications/tree/main/MADBugs/CVE-2026-4747
Resource: N/A
Details not found