Description
openxc/isotp-c thru commit 5a5d19245f65189202719321facd49ce6f5d46ac (2021-08-09) contains an out-of-bounds read in the ISO-TP Single Frame receive handler, where the 4-bit payload length nibble is used directly as the memcpy size without validating it against the actual CAN data length. A malicious CAN frame with an oversized length nibble can cause memory reads beyond the buffer, allowing attackers to cause a denial of service, or gain sensitive information.
INFO
Published Date :
2026-05-01T00:00:00.000Z
Last Modified :
2026-05-01T19:45:11.301Z
Source :
mitre
AFFECTED PRODUCTS
The following products are affected by CVE-2026-37535 vulnerability.
| Vendors | Products |
|---|---|
| Openxc |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-37535.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Complexity
Attack Vector
Availability Impact
Confidentiality Impact
Integrity Impact
Privileges Required
Scope
User Interaction