Cyber Posture

CVE-2026-0915

High

Published: 15 January 2026

Published
15 January 2026
Modified
23 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0002 6.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0915 is a high-severity Use of Uninitialized Resource (CWE-908) vulnerability in Gnu Glibc. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique DNS (T1071.004); ranked at the 6.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to DNS (T1071.004).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1071.004 DNS Command And Control
Adversaries may communicate using the Domain Name System (DNS) application layer protocol to avoid detection/network filtering by blending in with existing traffic.
Why these techniques?

Vulnerability directly causes stack memory disclosure transmitted to the DNS resolver, enabling data exfiltration over DNS protocol.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS…

more

resolver.

Deeper analysisAI

CVE-2026-0915, published on 2026-01-15, affects the GNU C Library (glibc) versions 2.0 through 2.42. The vulnerability arises when the functions getnetbyaddr or getnetbyaddr_r are called with an nsswitch.conf configuration that specifies the library's DNS backend for network lookups, and the query targets a zero-valued network. This results in stack contents being leaked to the configured DNS resolver. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and maps to CWE-908.

Remote attackers can exploit this vulnerability with low complexity, no required privileges, and no user interaction. Exploitation involves triggering the affected functions under the specified nsswitch.conf and network query conditions, enabling high confidentiality impact through the disclosure of stack memory contents transmitted to the DNS resolver.

Advisories and patches are detailed in the Sourceware Bugzilla entry at https://sourceware.org/bugzilla/show_bug.cgi?id=33802 and the OSS-Security mailing list post at http://www.openwall.com/lists/oss-security/2026/01/16/6.

Details

CWE(s)

Affected Products

gnu
glibc
2.0 — 2.42

CVEs Like This One

CVE-2025-15281Same product: Gnu Glibc
CVE-2026-0861Same product: Gnu Glibc
CVE-2026-4437Same product: Gnu Glibc
CVE-2026-4046Same product: Gnu Glibc
CVE-2026-5435Same product: Gnu Glibc
CVE-2026-5450Same product: Gnu Glibc
CVE-2026-5928Same product: Gnu Glibc
CVE-2025-13151Same vendor: Gnu
CVE-2026-28372Same vendor: Gnu
CVE-2026-32746Same vendor: Gnu

References