CVE-2026-1679
Published: 28 March 2026
Summary
CVE-2026-1679 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Zephyrproject Zephyr. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 16.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of user-provided socket payloads to ensure they fit within the fixed buffer size, preventing the buffer overflow.
Mandates timely patching of the identified buffer overflow flaw in the eswifi driver to eliminate the vulnerability.
Implements memory protections such as guard pages or randomization to mitigate kernel memory corruption from buffer overflows.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local buffer overflow in kernel driver enables low-privileged attacker to achieve kernel memory corruption for privilege escalation.
NVD Description
The eswifi socket offload driver copies user-provided payloads into a fixed buffer without checking available space; oversized sends overflow `eswifi->buf`, corrupting kernel memory (CWE-120). Exploit requires local code that can call the socket send API; no remote attacker can reach…
more
it directly.
Deeper analysisAI
CVE-2026-1679 is a buffer overflow vulnerability (CWE-120) in the eswifi socket offload driver within the Zephyr RTOS. The driver copies user-provided payloads into a fixed buffer without checking available space, allowing oversized sends to overflow the `eswifi->buf` structure and corrupt kernel memory. The vulnerability was published on 2026-03-28 and carries a CVSS v3.1 base score of 7.3 (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H).
A local attacker with low privileges can exploit this issue by executing code that calls the socket send API with oversized payloads. Remote attackers cannot reach the vulnerability directly. Successful exploitation enables kernel memory corruption, potentially leading to limited confidentiality loss alongside high integrity and availability impacts.
Mitigation details are available in the Zephyr Project security advisory at https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-qx3g-5g22-fq5w.
Details
- CWE(s)