Cyber Posture

CVE-2026-22891

CriticalPublic PoC

Published: 03 March 2026

Published
03 March 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0018 39.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

A heap-based buffer overflow vulnerability exists in the Intan CLP parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted Intan CLP file can lead to arbitrary code execution. An attacker can provide a malicious…

more

file to trigger this vulnerability.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely identification, reporting, and correction of system flaws like this heap-based buffer overflow in libbiosig, directly mitigating the vulnerability through patching.

prevent

SI-10 enforces input validation at file parsing points, preventing specially crafted Intan CLP files from triggering the heap buffer overflow.

prevent

SI-16 implements memory protections such as non-executable heap memory and ASLR, comprehensively mitigating exploitation of the heap-based buffer overflow for arbitrary code execution.

Security SummaryAI

CVE-2026-22891 is a heap-based buffer overflow vulnerability (CWE-122) in the Intan CLP parsing functionality of The Biosig Project's libbiosig version 3.9.2 and master branch (commit db9a9a63). The issue arises when processing a specially crafted Intan CLP file, which can trigger the overflow.

The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), making it exploitable over a network with low attack complexity, no privileges, and no user interaction required. Any unauthenticated attacker who can supply a malicious Intan CLP file to a vulnerable application using libbiosig can achieve arbitrary code execution.

Mitigation details and further technical analysis are provided in the Talos Intelligence advisories at https://talosintelligence.com/vulnerability_reports/TALOS-2026-2361 and https://www.talosintelligence.com/vulnerability_reports/TALOS-2026-2361.

Details

CWE(s)

Affected Products

libbiosig project
libbiosig
3.9.2

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows unauthenticated remote attackers to achieve arbitrary code execution by supplying a malicious Intan CLP file to a vulnerable application using libbiosig, directly mapping to exploitation of a public-facing application (AV:N/AC:L/PR:N/UI:N leading to RCE).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References