CVE-2026-22891
Published: 03 March 2026
Summary
CVE-2026-22891 is a critical-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Libbiosig Project Libbiosig. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 40.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely identification, reporting, and correction of system flaws like this heap-based buffer overflow in libbiosig, directly mitigating the vulnerability through patching.
SI-10 enforces input validation at file parsing points, preventing specially crafted Intan CLP files from triggering the heap buffer overflow.
SI-16 implements memory protections such as non-executable heap memory and ASLR, comprehensively mitigating exploitation of the heap-based buffer overflow for arbitrary code execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows unauthenticated remote attackers to achieve arbitrary code execution by supplying a malicious Intan CLP file to a vulnerable application using libbiosig, directly mapping to exploitation of a public-facing application (AV:N/AC:L/PR:N/UI:N leading to RCE).
NVD Description
A heap-based buffer overflow vulnerability exists in the Intan CLP parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted Intan CLP file can lead to arbitrary code execution. An attacker can provide a malicious…
more
file to trigger this vulnerability.
Deeper analysisAI
CVE-2026-22891 is a heap-based buffer overflow vulnerability (CWE-122) in the Intan CLP parsing functionality of The Biosig Project's libbiosig version 3.9.2 and master branch (commit db9a9a63). The issue arises when processing a specially crafted Intan CLP file, which can trigger the overflow.
The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), making it exploitable over a network with low attack complexity, no privileges, and no user interaction required. Any unauthenticated attacker who can supply a malicious Intan CLP file to a vulnerable application using libbiosig can achieve arbitrary code execution.
Mitigation details and further technical analysis are provided in the Talos Intelligence advisories at https://talosintelligence.com/vulnerability_reports/TALOS-2026-2361 and https://www.talosintelligence.com/vulnerability_reports/TALOS-2026-2361.
Details
- CWE(s)