CVE-2026-22891
Published: 03 March 2026
Description
A heap-based buffer overflow vulnerability exists in the Intan CLP parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted Intan CLP file can lead to arbitrary code execution. An attacker can provide a malicious…
more
file to trigger this vulnerability.
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely identification, reporting, and correction of system flaws like this heap-based buffer overflow in libbiosig, directly mitigating the vulnerability through patching.
SI-10 enforces input validation at file parsing points, preventing specially crafted Intan CLP files from triggering the heap buffer overflow.
SI-16 implements memory protections such as non-executable heap memory and ASLR, comprehensively mitigating exploitation of the heap-based buffer overflow for arbitrary code execution.
Security SummaryAI
CVE-2026-22891 is a heap-based buffer overflow vulnerability (CWE-122) in the Intan CLP parsing functionality of The Biosig Project's libbiosig version 3.9.2 and master branch (commit db9a9a63). The issue arises when processing a specially crafted Intan CLP file, which can trigger the overflow.
The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), making it exploitable over a network with low attack complexity, no privileges, and no user interaction required. Any unauthenticated attacker who can supply a malicious Intan CLP file to a vulnerable application using libbiosig can achieve arbitrary code execution.
Mitigation details and further technical analysis are provided in the Talos Intelligence advisories at https://talosintelligence.com/vulnerability_reports/TALOS-2026-2361 and https://www.talosintelligence.com/vulnerability_reports/TALOS-2026-2361.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows unauthenticated remote attackers to achieve arbitrary code execution by supplying a malicious Intan CLP file to a vulnerable application using libbiosig, directly mapping to exploitation of a public-facing application (AV:N/AC:L/PR:N/UI:N leading to RCE).