Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-42483

A heap-based buffer overflow in the Kerberos hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted Kerberos hash file. The issue affects module_hash_decode in multiple Kerberos-related modules because account_info_len is calculated from untrusted delimiter positions without upper-bound validation before memcpy copies the data into a fixed-size account_info buffer.

View on NVD

Analysis

Hashcat is a widely used tool among developers and security professionals for password recovery and auditing. This is a critical heap-based buffer overflow in the Kerberos hash parser that could lead to RCE when a user processes a malicious hash file.

Severity

Score: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-787CWE-122

EPSS

Probability of exploitation (next 30 days): 0.0008 (0.1%)
Percentile: 23.1%
EPSS: 2026-05-06

Affects

hashcat:hashcat

Technical description

A heap-based buffer overflow in the Kerberos hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted Kerberos hash file. The issue affects module_hash_decode in multiple Kerberos-related modules because account_info_len is calculated from untrusted delimiter positions without upper-bound validation before memcpy copies the data into a fixed-size account_info buffer.

Published: 5/1/2026, 2:16:22 PM
Last modified: 5/1/2026, 6:16:16 PM

References

HomeEventsBlogResourcesTeam