Analyse en attenteCVE-2026-44290

CVE-2026-44290: DoS in protobufjs ≤7.5.5

Plateforme

nodejs

Composant

protobufjs

CVE-2026-44290 describes a Denial of Service (DoS) vulnerability affecting protobufjs versions up to 7.5.5. This vulnerability arises from improper handling of schema option paths, allowing attackers to corrupt process-wide JavaScript constructors. Successful exploitation can lead to a persistent denial of service, impacting the application's functionality and potentially affecting other processes.

Impact et Scénarios d'Attaquetraduction en cours…

The core of this vulnerability lies in protobufjs's option handling mechanism. When processing protobuf schemas or JSON descriptors, the parser incorrectly traverses inherited object properties. A malicious actor can craft a schema or descriptor that exploits this flaw, causing the parser to write to properties on global JavaScript constructors, such as Object, Array, or String. This corruption effectively breaks the fundamental building blocks of the JavaScript runtime, leading to unpredictable behavior and application crashes. The impact is persistent; the corruption remains until the process is restarted, resulting in a prolonged denial of service. This differs from transient DoS attacks as it requires no ongoing exploitation.

Contexte d'Exploitationtraduction en cours…

CVE-2026-44290 was published on 2026-05-12. The vulnerability's severity is rated as HIGH (CVSS 7.5). Currently, there are no publicly available Proof-of-Concept (POC) exploits. The vulnerability is not listed on KEV or EPSS, indicating a low to medium probability of active exploitation at this time. Monitor security advisories and threat intelligence feeds for any updates regarding exploitation attempts.

Renseignement sur les Menaces

Statut de l'Exploit

Preuve de ConceptInconnu
CISA KEVNO
Exposition InternetÉlevée

Vecteur CVSS

RENSEIGNEMENT SUR LES MENACES· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H7.5HIGHAttack VectorNetworkComment l'attaquant atteint la cibleAttack ComplexityLowConditions requises pour exploiterPrivileges RequiredNoneNiveau d'authentification requisUser InteractionNoneSi une action de la victime est requiseScopeUnchangedImpact au-delà du composant affectéConfidentialityNoneRisque d'exposition de données sensiblesIntegrityNoneRisque de modification non autorisée de donnéesAvailabilityHighRisque d'interruption de servicenextguardhq.com · Score de base CVSS v3.1
Que signifient ces métriques?
Attack Vector
Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
Attack Complexity
Faible — aucune condition spéciale requise. Exploitable de manière fiable.
Privileges Required
Aucun — sans authentification. Aucune identifiant requis pour exploiter.
User Interaction
Aucune — attaque automatique et silencieuse. La victime ne fait rien.
Scope
Inchangé — impact limité au composant vulnérable.
Confidentiality
Aucun — aucun impact sur la confidentialité.
Integrity
Aucun — aucun impact sur l'intégrité.
Availability
Élevé — panne complète ou épuisement des ressources. Déni de service total.

Logiciel Affecté

Composantprotobufjs
Version maximale7.5.5

Classification de Faiblesse (CWE)

Chronologie

  1. Publiée

Mitigation et Contournementstraduction en cours…

The primary mitigation for CVE-2026-44290 is to upgrade to a patched version of protobufjs. While a specific fixed version is not yet available, monitoring the project's release notes is crucial. In the interim, implement strict schema validation to prevent the parsing of untrusted or potentially malicious protobuf schemas and JSON descriptors. This can involve whitelisting allowed schema structures or using a schema validation library. Consider implementing a Web Application Firewall (WAF) or proxy to inspect and filter incoming protobuf data, blocking requests containing suspicious schema constructs. Carefully review any third-party libraries or components that utilize protobufjs and ensure they are not vulnerable to this issue.

Comment corrigertraduction en cours…

Aucun correctif officiel disponible. Recherchez des alternatives ou surveillez les mises à jour.

Questions fréquentestraduction en cours…

What is CVE-2026-44290 — DoS in protobufjs?

CVE-2026-44290 is a high-severity Denial of Service vulnerability in protobufjs versions up to 7.5.5. A crafted protobuf schema can corrupt JavaScript constructors, leading to application crashes and a persistent denial of service.

Am I affected by CVE-2026-44290 in protobufjs?

You are affected if you are using protobufjs versions 7.5.5 or earlier. Review your project dependencies to determine if you are using a vulnerable version.

How do I fix CVE-2026-44290 in protobufjs?

Upgrade to a patched version of protobufjs as soon as it becomes available. In the meantime, implement strict schema validation and consider WAF rules to filter malicious protobuf data.

Is CVE-2026-44290 being actively exploited?

Currently, there are no publicly known exploits or reports of active exploitation. However, the vulnerability's severity warrants immediate attention and mitigation.

Where can I find the official protobufjs advisory for CVE-2026-44290?

Refer to the protobufjs project's official website and GitHub repository for updates and advisories related to CVE-2026-44290: https://protobufjs.org/

Ton projet est-il affecté ?

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.

en directfree scan

Essayez maintenant — sans compte

scanZone.subtitle

Scan manuelSlack/email alertsContinuous monitoringWhite-label reports

Glissez-déposez votre fichier de dépendances

composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...