CVE-2026-38719
Out-of-Bounds Read in OpENer CPF Parser
Publication date: 2026-05-18
Last updated on: 2026-05-18
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| opener | opener | 2.3-558-g1e99582 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OpENer version v2.3-558-g1e99582 within the Common Packet Format (CPF) parser. Specifically, the function CreateCommonPacketFormatStructure() does not properly validate an attacker-controlled item_count value against the remaining data length of the CPF slice. This leads to an out-of-bounds read, where the software reads memory outside the intended buffer.
How can this vulnerability impact me? :
The vulnerability can cause an out-of-bounds read, which may lead to a denial of service (DoS) by crashing the affected application or system. According to the CVSS score (6.2), the impact is primarily on availability, with no direct impact on confidentiality or integrity.