CVE-2026-8276
Received Received - Intake
Integer Coercion Error in Bettercap MySQL Server

Publication date: 2026-05-11

Last updated on: 2026-05-11

Assigner: VulDB

Description
A flaw has been found in bettercap up to 2.41.5. Affected by this issue is some unknown functionality of the file modules/mysql_server/mysql_server.go of the component MySQL Server. Executing a manipulation can lead to integer coercion error. The attack can be launched remotely. The attack requires a high level of complexity. The exploitation is known to be difficult. The exploit has been published and may be used. This patch is called 0eaa375c5e5446bfba94a290eff92967a5deac9e. It is advisable to implement a patch to correct this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-11
Last Modified
2026-05-11
Generated
2026-05-11
AI Q&A
2026-05-11
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
bettercap bettercap 2.41.5
mysql mysql_server *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-192 Integer coercion refers to a set of flaws pertaining to the type casting, extension, or truncation of primitive data types.
CWE-189
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-8276 is a remote denial-of-service (DoS) vulnerability in the MySQL server component of bettercap up to version 2.41.5. It occurs due to improper handling of client handshake packets, specifically when a crafted packet with certain capability flags causes the code to access an out-of-range index in a binary string representation of these flags. This leads to a runtime panic and crashes the entire bettercap process.

The root cause is that the code formats capability flags as an 8-bit binary string but then attempts to access the 9th character (index 8), which does not exist, causing an index-out-of-range error. Additionally, there was no proper validation of the handshake packet length before parsing, allowing malformed or truncated packets to trigger the crash.

The vulnerability can be exploited remotely by an unauthenticated attacker sending a specially crafted MySQL client handshake packet, and the attack requires a high level of complexity.


How can this vulnerability impact me? :

This vulnerability can cause a remote denial-of-service (DoS) condition by crashing the entire bettercap process when it receives a maliciously crafted MySQL client handshake packet.

As a result, any services or operations relying on bettercap's MySQL server component may become unavailable or interrupted, potentially impacting system stability and availability.

Since the attack can be launched remotely without authentication, it poses a risk of disruption from external attackers on the network.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unusual crashes or denial-of-service events in the bettercap process, specifically related to the MySQL server module. Since the exploit involves sending a specially crafted MySQL client handshake packet with a capability flags byte set to 0x00, network traffic analysis tools can be used to detect such malformed handshake packets.

A practical approach is to capture and inspect MySQL handshake packets on the network using packet capture tools like tcpdump or Wireshark, filtering for packets with unusual or malformed capability flags.

  • Use tcpdump to capture MySQL handshake packets: tcpdump -i <interface> 'tcp port 3306 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) > 0)' -w capture.pcap
  • Analyze the captured packets in Wireshark, looking for handshake packets with capability flags byte set to 0x00 or packets shorter than 37 bytes.

Additionally, monitoring bettercap logs or system logs for unexpected crashes or panics related to mysql_server.go can help detect exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to apply the patch identified as commit 0eaa375c5e5446bfba94a290eff92967a5deac9e which fixes the vulnerability by adding validation checks on the handshake packet length and correcting the parsing of client capability flags.

Until the patch is applied, consider restricting access to the bettercap MySQL server component from untrusted or unauthenticated clients to reduce the risk of remote exploitation.

Monitoring and alerting on unexpected bettercap process crashes can also help in early detection of exploitation attempts.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not include any details about the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart