🔐 CVE Alert

CVE-2026-43618

HIGH 8.1

Rsync < 3.4.3 Integer Overflow Information Disclosure

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

Rsync version 3.4.2 and prior contain an integer overflow vulnerability in the compressed-token decoder where a 32-bit signed counter is not checked for overflow, allowing a malicious sender to trigger an overflow that causes the receiver process to read and return data from outside the intended buffer bounds. Attackers can exploit this vulnerability to disclose process memory contents including environment variables, passwords, heap and stack data, and library memory pointers, significantly reducing ASLR effectiveness and facilitating further exploitation.

CWE CWE-190 CWE-125
Vendor rsyncproject
Product rsync
Published May 20, 2026
Last Updated May 20, 2026
Stay Ahead of the Next One

Get instant alerts for rsyncproject rsync

Be the first to know when new high vulnerabilities affecting rsyncproject rsync are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High

Affected Versions

RsyncProject / rsync
0 < 3.4.3

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/RsyncProject/rsync/security/advisories/GHSA-g37v-g3gj-pmwq github.com: https://github.com/RsyncProject/rsync/releases/tag/v3.4.3 vulncheck.com: https://www.vulncheck.com/advisories/rsync-integer-overflow-information-disclosure

Credits

Omar Elsayed (@seks99x)