Cyber Posture

CVE-2026-1679

HighPublic PoC

Published: 28 March 2026

Published
28 March 2026
Modified
31 March 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
EPSS Score 0.0005 16.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-1679 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Zephyrproject Zephyr. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 16.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of user-provided socket payloads to ensure they fit within the fixed buffer size, preventing the buffer overflow.

prevent

Mandates timely patching of the identified buffer overflow flaw in the eswifi driver to eliminate the vulnerability.

prevent

Implements memory protections such as guard pages or randomization to mitigate kernel memory corruption from buffer overflows.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local buffer overflow in kernel driver enables low-privileged attacker to achieve kernel memory corruption for privilege escalation.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

The eswifi socket offload driver copies user-provided payloads into a fixed buffer without checking available space; oversized sends overflow `eswifi->buf`, corrupting kernel memory (CWE-120). Exploit requires local code that can call the socket send API; no remote attacker can reach…

more

it directly.

Deeper analysisAI

CVE-2026-1679 is a buffer overflow vulnerability (CWE-120) in the eswifi socket offload driver within the Zephyr RTOS. The driver copies user-provided payloads into a fixed buffer without checking available space, allowing oversized sends to overflow the `eswifi->buf` structure and corrupt kernel memory. The vulnerability was published on 2026-03-28 and carries a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H).

A local attacker with low privileges can exploit this issue by executing code that calls the socket send API with oversized payloads. Remote attackers cannot reach the vulnerability directly. Successful exploitation enables kernel memory corruption, potentially leading to limited confidentiality loss alongside high integrity and availability impacts.

Mitigation details are available in the Zephyr Project security advisory at https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-qx3g-5g22-fq5w.

Details

CWE(s)

Affected Products

zephyrproject
zephyr
≤ 4.3.0

CVEs Like This One

CVE-2024-10395Same product: Zephyrproject Zephyr
CVE-2025-1674Same product: Zephyrproject Zephyr
CVE-2025-1673Same product: Zephyrproject Zephyr
CVE-2025-1675Same product: Zephyrproject Zephyr
CVE-2026-1678Same product: Zephyrproject Zephyr
CVE-2025-71263Shared CWE-120
CVE-2025-47389Shared CWE-120
CVE-2026-31622Shared CWE-120
CVE-2025-48611Shared CWE-120
CVE-2025-0303Shared CWE-120

References