Description
The Sleuth Kit through 4.14.0 contains an out-of-bounds read vulnerability in the APFS filesystem keybag parser where the wrapped_key_parser class follows attacker-controlled length fields without bounds checking, causing heap reads past the allocated buffer. An attacker can craft a malicious APFS disk image that triggers information disclosure or crashes when processed by any Sleuth Kit tool that parses APFS volumes.
INFO
Published Date :
2026-04-08T21:35:21.537Z
Last Modified :
2026-04-09T16:16:39.403Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2026-40025 vulnerability.
| Vendors | Products |
|---|---|
| Sleuthkit |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-40025.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact