Cyber Posture

CVE-2026-2219

High

Published: 07 March 2026

Published
07 March 2026
Modified
09 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0002 5.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-2219 is a high-severity Infinite Loop (CWE-835) vulnerability in Debian (inferred from references). Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 5.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-835

Enables transfer to alternate site if an infinite loop at the primary renders processing unavailable.

addresses: CWE-835

Detects and mitigates infinite loops that produce sustained resource consumption.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Direct mapping to application exploitation causing endpoint DoS via infinite loop/CPU exhaustion in dpkg-deb decompression.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning…

more

the CPU).

Deeper analysisAI

CVE-2026-2219 is a vulnerability in dpkg-deb, a component of dpkg, the Debian package management system. It stems from improper validation of the end of the data stream during decompression of zstd-compressed .deb archives, which can trigger a denial of service via an infinite loop that consumes CPU resources (CWE-835: Loop with Unreachable Exit Condition). The issue was published on 2026-03-07 and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

An unauthenticated remote attacker can exploit this vulnerability over the network with low attack complexity and no user interaction or privileges required. By providing a specially crafted zstd-compressed .deb archive for extraction via dpkg-deb, the attacker induces an infinite decompression loop, resulting in high availability impact through sustained CPU exhaustion, while confidentiality and integrity remain unaffected.

Mitigation is provided through a patch in the dpkg Git repository at commit 6610297a62c0780dd0e80b0e302ef64fdcc9d313. Further details, including the bug report and resolution, are documented in the Debian bug tracker at https://bugs.debian.org/1129722. Security practitioners should update affected dpkg installations promptly.

Details

CWE(s)

Affected Products

Debian
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-32287Shared CWE-835
CVE-2026-31448Shared CWE-835
CVE-2026-21507Shared CWE-835
CVE-2026-26283Shared CWE-835
CVE-2025-64438Shared CWE-835
CVE-2026-33013Shared CWE-835
CVE-2026-27628Shared CWE-835
CVE-2026-35406Shared CWE-835
CVE-2026-32256Shared CWE-835
CVE-2026-7375Shared CWE-835

References