Cyber Posture

CVE-2026-2436

MediumPublic PoC

Published: 26 March 2026

Published
26 March 2026
Modified
21 April 2026
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
EPSS Score 0.0006 18.5th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.

Security Summary

CVE-2026-2436 is a use-after-free vulnerability in libsoup's SoupServer component. The flaw arises in the soup_server_disconnect() function, which prematurely frees connection objects even when a TLS handshake is still pending. If the handshake completes after the object has been freed, a dangling pointer is accessed, causing a server crash.

A remote attacker with network access can exploit this vulnerability without privileges or user interaction, though it requires high attack complexity. Exploitation triggers a denial of service through server crash, with low integrity impact but high availability impact and no confidentiality impact. The CVSS v3.1 base score is 6.5 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H), mapped to CWE-825 (Expired Pointer Dereference).

Advisories and patches are detailed in Red Hat's security bulletin at https://access.redhat.com/security/cve/CVE-2026-2436, Red Hat Bugzilla entry https://bugzilla.redhat.com/show_bug.cgi?id=2442909, and the GNOME libsoup issue tracker at https://gitlab.gnome.org/GNOME/libsoup/-/issues/501. Security practitioners should review these resources for mitigation guidance and available updates.

Details

CWE(s)
CWE-825

Affected Products

gnome
libsoup
all versions
redhat
enterprise linux
10.0, 6.0, 7.0, 8.0, 9.0

MITRE ATT&CK Enterprise Techniques

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Use-after-free in libsoup SoupServer enables remote exploitation to crash the server without privileges or interaction, directly facilitating endpoint DoS via application exploitation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References