Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-40356
Received
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-28 Apr, 2026 | 07:16
Updated At-28 Apr, 2026 | 07:16

In MIT Kerberos 5 (aka krb5) before 1.22.3, there is an integer underflow and resultant out-of-bounds read if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, possibly causing the process to terminate in parse_message.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Secondary
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-191Primarycve@mitre.org
CWE ID: CWE-191
Type: Primary
Source: cve@mitre.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://cems.fun/2026/04/27/krb5-two-unauthenticated-network-vulnerabilities.htmlcve@mitre.org
N/A
https://github.com/krb5/krb5/commit/2e75f0d9362fb979f5fc92829431a590a130929fcve@mitre.org
N/A
https://web.mit.edu/kerberos/advisories/cve@mitre.org
N/A
Hyperlink: https://cems.fun/2026/04/27/krb5-two-unauthenticated-network-vulnerabilities.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/krb5/krb5/commit/2e75f0d9362fb979f5fc92829431a590a130929f
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://web.mit.edu/kerberos/advisories/
Source: cve@mitre.org
Resource: N/A
Change History
0Changes found

Details not found