Skip to main content
Mallory

Two Buffer Overflows in OVMS3 Expose Vehicle Monitoring Systems to DoS and RCE

autonomous-system-securityembedded-device-vulnerabilityproof-of-concept-release
Updated May 1, 2026 at 09:04 PM2 sources
Share:
Two Buffer Overflows in OVMS3 Expose Vehicle Monitoring Systems to DoS and RCE

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Two high-severity vulnerabilities have been disclosed in Open Vehicle Monitoring System 3 (OVMS3) version 3.3.005, both stemming from improper input validation that can lead to buffer overflows. CVE-2026-42469 affects canformat_canswitch.cpp, where the software fails to properly validate a CANswitch DLC value; a remote attacker can send crafted CANswitch frames to trigger a denial of service and potentially achieve arbitrary code execution. The flaw is tracked as CWE-121 and carries a CVSS v3.1 vector of AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H, indicating network-reachable exploitation with no privileges or user interaction required and a high impact on availability.

A second flaw, CVE-2026-42468, affects canformat_pcap.cpp, where OVMS3 does not correctly validate the phdr.len field while parsing PCAP input. An attacker can use crafted PCAP data to cause a denial of service and potentially execute arbitrary code; the updated CVSS v3.1 scoring indicates user interaction is required and that confidentiality, integrity, and availability may all be affected. The CVE records were updated to refine severity details, add CWE-121 classification, and, for CVE-2026-42469, include a public GitHub Gist reference.

Timeline

  1. May 1, 2026

    CVE records updated with scoring and reference details

    The CVE records were updated on May 1, 2026 to add CWE-121 classification and revise CVSS v3.1 scoring details. The CVE-2026-42469 entry also added a public GitHub Gist reference.

  2. May 1, 2026

    CVE-2026-42469 disclosed for OVMS3 CANswitch buffer overflow

    A second OVMS3 version 3.3.005 buffer overflow vulnerability was disclosed in canformat_canswitch.cpp. The issue is caused by improper validation of a CANswitch DLC value and could be exploited remotely with crafted CANswitch frames to cause denial of service and potentially arbitrary code execution.

  3. May 1, 2026

    CVE-2026-42468 disclosed for OVMS3 PCAP parser buffer overflow

    A buffer overflow vulnerability affecting Open Vehicle Monitoring System 3 (OVMS3) version 3.3.005 was disclosed in canformat_pcap.cpp. The flaw stems from improper validation of the phdr.len field when processing crafted PCAP input, allowing denial of service and possible arbitrary code execution.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

May 1, 2026 at 12:00 AM
May 1, 2026 at 12:00 AM

Related Stories

Two High-Severity Buffer Overflow Flaws Disclosed in LinkingVision rapidvms

Two High-Severity Buffer Overflow Flaws Disclosed in LinkingVision rapidvms

Two high-severity vulnerabilities, **CVE-2026-33848** and **CVE-2026-33849**, were disclosed in **LinkingVision rapidvms**, both classified as **CWE-119** improper restriction of operations within the bounds of a memory buffer. The flaws affect **rapidvms versions before `PR#96`** and carry the same **CVSS v3.1** vector, `AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H`, indicating network-reachable exploitation with low attack complexity, no required privileges, user interaction, and potential for high impact across confidentiality, integrity, and availability. Both CVE records point to **GitHub pull request `#96`** in the `linkingvision/rapidvms` repository as the referenced fix or related remediation. Organizations running vulnerable rapidvms builds should review the changes in that pull request, identify any exposed instances, and prioritize upgrading or patching affected systems because successful exploitation could lead to severe compromise of the video management platform.

1 months ago
Multiple Memory Corruption Flaws Disclosed in Automotive CAN Libraries

Multiple Memory Corruption Flaws Disclosed in Automotive CAN Libraries

Innora Security Research disclosed 11 vulnerabilities across eight automotive CAN-related libraries and tools, including **Open-SAE-J1939**, `isotp-c`, `uds-c`, `socketcand`, `cannelloni`, `OpenAMP`, and `OVMS3`. The issues span integer underflow and overflow, stack and heap buffer overflows, and other out-of-bounds memory access conditions affecting software used in ECUs, CAN gateways, diagnostic tooling, industrial networks, and research platforms. The report said several flaws are reachable through crafted CAN frames, tunneled CAN traffic, malformed firmware images, or malicious log files, with many assigned **CVSS 9.8** severity due to the potential for remote memory corruption and service disruption. One of the newly tracked issues, **`CVE-2026-37537`**, affects `collin80/Open-SAE-J1939` through commit `744024d4306bc387857dfce439558336806acb06`. In the library's Transport Protocol Data Transfer handling, a CAN frame with `data[0] = 0` causes the calculation `uint8_t index = data[0] - 1` to underflow to `255`, leading to an out-of-bounds write past the allocated `MAX_TP_DT` buffer. The vulnerability was assigned **CVSS v3.1 `AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H`**, indicating an adjacent-network attack path with high integrity and availability impact, and it underscores broader unsafe length handling and unchecked memory operations across the affected CAN software ecosystem.

Today
High-Severity Buffer Bounds Flaw in Portwell Engineering Toolkits Driver (CVE-2026-3437)

High-Severity Buffer Bounds Flaw in Portwell Engineering Toolkits Driver (CVE-2026-3437)

CISA published an ICS advisory for **CVE-2026-3437**, a **high-severity** memory safety issue (*CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer*) affecting **Portwell Engineering Toolkits v4.8.2**. The flaw is in the Portwell Engineering Toolkits **driver** and could allow a **local, authenticated attacker** to **read and write arbitrary memory**, enabling **privilege escalation** or **denial of service**; CISA scored it **CVSS v3.1 8.8 (High)** with a local attack vector and low complexity. The CVE record corroborates the same impact and affected version, and additionally lists a **CVSS v4.0** vector consistent with high impact to confidentiality, integrity, and availability. The vulnerability was reported to CISA by **Jason Huang** of **TXOne Networks** (Cyber Threat & Product Defense Center), and the advisory notes deployment across critical infrastructure environments (including **Energy** and **Critical Manufacturing**) with worldwide exposure.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.