๐Ÿ” CVE Alert

CVE-2026-2966

LOW 3.7

Cesanta Mongoose DNS Transaction ID dns.c mg_sendnsreq random values

CVSS Score
3.7
EPSS Score
0.0%
EPSS Percentile
0th

A weakness has been identified in Cesanta Mongoose up to 7.20. The impacted element is the function mg_sendnsreq of the file /src/dns.c of the component DNS Transaction ID Handler. Executing a manipulation of the argument random can lead to insufficiently random values. The attack can be launched remotely. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

CWE CWE-330 CWE-310
Vendor cesanta
Product mongoose
Published Feb 23, 2026
Last Updated Feb 23, 2026
Stay Ahead of the Next One

Get instant alerts for cesanta mongoose

Be the first to know when new low vulnerabilities affecting cesanta mongoose are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Cesanta / Mongoose
7.0 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 7.9 7.10 7.11 7.12 7.13 7.14 7.15 7.16 7.17 7.18 7.19 7.20

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.347333 vuldb.com: https://vuldb.com/?ctiid.347333 vuldb.com: https://vuldb.com/?submit.755304 github.com: https://github.com/dwBruijn/CVEs/blob/main/Mongoose/mg_sendnsreq.md github.com: https://github.com/dwBruijn/CVEs/blob/main/Mongoose/mg_sendnsreq.md#poc

Credits

๐Ÿ” dwbruijn (VulDB User)