Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 01 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-125 | |
| Metrics |
ssvc
|
Fri, 01 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | openxc/isotp-c thru commit 5a5d19245f65189202719321facd49ce6f5d46ac (2021-08-09) contains an out-of-bounds read in the ISO-TP Single Frame receive handler, where the 4-bit payload length nibble is used directly as the memcpy size without validating it against the actual CAN data length. A malicious CAN frame with an oversized length nibble can cause memory reads beyond the buffer, allowing attackers to cause a denial of service, or gain sensitive information. | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-01T19:45:11.301Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-37535
Updated: 2026-05-01T19:32:44.346Z
Status : Received
Published: 2026-05-01T17:16:23.210
Modified: 2026-05-01T20:16:23.150
Link: CVE-2026-37535
No data.
OpenCVE Enrichment
No data.
No weakness.