CVE-2026-40355
Received Received - Intake
NULL Pointer Dereference in MIT Kerberos 5 Enables DoS

Publication date: 2026-04-28

Last updated on: 2026-04-28

Assigner: MITRE

Description
In MIT Kerberos 5 (aka krb5) before 1.22.3, there is a NULL pointer dereference if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, causing the process to terminate in parse_nego_message.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-04-28
Generated
2026-05-06
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
mit kerberos to 1.22.3 (exc)
mit krb5 to 1.22.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-40355 is a null pointer dereference vulnerability in the MIT Kerberos 5 (krb5) authentication software. It occurs specifically in the function parse_nego_message() when the second call to vector_base() returns NULL but this is not checked before dereferencing. This flaw can be triggered when an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech.

An unauthenticated remote attacker can exploit this vulnerability to cause the process to terminate (crash) due to the null pointer dereference.


How can this vulnerability impact me? :

This vulnerability allows an unauthenticated remote attacker to cause a denial-of-service (DoS) by crashing the process that calls gss_accept_sec_context(). Since the process terminates unexpectedly, it can disrupt authentication services relying on MIT Kerberos, potentially affecting system availability.

Although the service may be supervised to restart after crashes, repeated exploitation could lead to service instability or downtime.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability causes the process running MIT Kerberos 5 to terminate unexpectedly when an unauthenticated remote attacker triggers a null pointer dereference in the function parse_nego_message(). Detection can involve monitoring for unexpected crashes or restarts of services using krb5, especially those invoking gss_accept_sec_context() with the NegoEx mechanism.

A proof-of-concept demonstration used a Dockerized krb5 environment compiled with AddressSanitizer (ASan) to detect memory-safety failures remotely.

While no specific commands are provided in the resources, general detection steps include:

  • Monitoring system logs and service logs for crashes or restarts of krb5-related processes.
  • Using AddressSanitizer or similar memory error detection tools when running krb5 in a test environment to detect null pointer dereferences.
  • Checking for the presence of the NegoEx mechanism registered in /etc/gss/mech, as the vulnerability is triggered only if this mechanism is present.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to apply the upstream patch that fixes this vulnerability or update to a fixed version of MIT Kerberos 5 (krb5) at or after version 1.22.3.

The fix involves adding checks to prevent null pointer dereferences and integer underflows in the NegoEx mechanism parsing code.

Until the patch or update is applied, users should consider:

  • Disabling or removing the NegoEx mechanism from /etc/gss/mech if it is not required.
  • Monitoring for unusual crashes or restarts of krb5 services as an indicator of exploitation attempts.
  • Running krb5 services with supervision to automatically restart child listeners after crashes, minimizing service disruption.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in MIT Kerberos 5 (CVE-2026-40355) allows an unauthenticated remote attacker to cause a denial-of-service by crashing the process through a null pointer dereference. This can impact the availability of authentication services relying on MIT Kerberos.

While the vulnerability does not directly compromise confidentiality or integrity of data, the resulting denial-of-service could affect compliance with standards such as GDPR or HIPAA, which require maintaining availability and integrity of systems processing sensitive data.

Organizations relying on MIT Kerberos for authentication should consider this vulnerability as a risk to service availability and apply patches or updates to mitigate potential disruptions that could impact regulatory compliance.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart