๐Ÿ” CVE Alert

CVE-2026-4747

HIGH 8.8

Remote code execution via RPCSEC_GSS packet validation

CVSS Score
8.8
EPSS Score
0.2%
EPSS Percentile
37th

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel. In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system.

CWE CWE-121
Vendor freebsd
Product freebsd
Published Mar 26, 2026
Last Updated Apr 2, 2026
Stay Ahead of the Next One

Get instant alerts for freebsd freebsd

Be the first to know when new high vulnerabilities affecting freebsd freebsd are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

FreeBSD / FreeBSD
15.0-RELEASE < p5 14.4-RELEASE < p1 14.3-RELEASE < p10 13.5-RELEASE < p11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
security.freebsd.org: https://security.freebsd.org/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc github.com: https://github.com/califio/publications/blob/main/MADBugs/CVE-2026-4747/exploit.py github.com: https://github.com/califio/publications/tree/main/MADBugs/CVE-2026-4747

Credits

Nicholas Carlini using Claude, Anthropic