CVE-2026-35091 - Vulnerability Analysis
HighCVSS: 8.2Last Updated: April 1, 2026
Corosync - Out of Bounds Read
Overview
Corosync contains an out-of-bounds read caused by a wrong return value in the membership commit token sanity check in totemudp mode, letting remote unauthenticated attackers cause denial of service and limited memory disclosure.
Severity & Score
Impact
Remote attackers can cause denial of service and potentially disclose limited memory contents.
Mitigation
Update to the latest version of Corosync.
References
Social Media Activity(4 posts)
š CVE-2026-35091 - High (8.2) A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead t... š https://www.thehackerwire.com/vulnerability/CVE-2026-35091/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-35091 - High (8.2) A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead t... š https://www.thehackerwire.com/vulnerability/CVE-2026-35091/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-35091 - High (8.2) A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead t... š https://www.thehackerwire.com/vulnerability/CVE-2026-35091/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-35091 - High (8.2) A flaw was found in Corosync. A remote unauthenticated attacker can exploit a wrong return value vulnerability in the Corosync membership commit token sanity check by sending a specially crafted User Datagram Protocol (UDP) packet. This can lead t... š https://www.thehackerwire.com/vulnerability/CVE-2026-35091/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-35091
- Severity
- High
- CVSS Score
- 8.2
- Type
- out_of_bounds_rw
- Status
- unconfirmed
- EPSS
- 0.0%
- Social Posts
- 4
CWE
- CWE-253
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H