CVE-2026-44602
Received Received - Intake
BaseFortify

Publication date: 2026-05-07

Last updated on: 2026-05-07

Assigner: MITRE

Description
Tor before 0.4.9.7 has a NULL pointer dereference when a CERT cell is received out of order, aka TROVE-2026-006.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-07
Last Modified
2026-05-07
Generated
2026-05-07
AI Q&A
2026-05-07
EPSS Evaluated
N/A
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tor_project tor to 0.4.9.7 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-44602 is a vulnerability in Tor versions before 0.4.9.7 where a NULL pointer dereference occurs when a CERT cell is received out of order. This means that the software attempts to access a memory location that is not properly initialized, which can cause the program to crash.


How can this vulnerability impact me? :

This vulnerability can lead to application crashes due to the NULL pointer dereference when processing CERT cells out of order. Such crashes may cause denial of service by interrupting the normal operation of the Tor client or relay.


What immediate steps should I take to mitigate this vulnerability?

The Tor Project strongly recommends upgrading to Tor version 0.4.9.7 immediately to fix this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart