Cyber Posture

CVE-2026-23995

HighPublic PoC

Published: 26 March 2026

Published
26 March 2026
Modified
31 March 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.3th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23995 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Linuxfoundation Everest. Its CVSS base score is 8.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of information inputs like interface names to prevent buffer overflows from exceeding IFNAMSIZ limits.

prevent

SI-16 enforces memory protections such as stack canaries, DEP, and ASLR to block code execution from stack buffer overflows.

prevent

SI-2 mandates timely flaw remediation by applying the patch in EVerest version 2026.02.0 to fix the buffer overflow vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local stack buffer overflow enabling arbitrary code execution with no privileges required.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

EVerest is an EV charging software stack. Prior to version 2026.02.0, stack-based buffer overflow in CAN interface initialization: passing an interface name longer than IFNAMSIZ (16) to CAN open routines overflows `ifreq.ifr_name`, corrupting adjacent stack data and enabling potential code…

more

execution. A malicious or misconfigured interface name can trigger this before any privilege checks. Version 2026.02.0 contains a patch.

Deeper analysisAI

CVE-2026-23995 is a stack-based buffer overflow vulnerability (CWE-121) in the EVerest EV charging software stack, affecting versions prior to 2026.02.0. The issue occurs during CAN interface initialization when an interface name longer than IFNAMSIZ (16 bytes) is passed to CAN open routines, overflowing the `ifreq.ifr_name` buffer and corrupting adjacent stack data. This can enable potential arbitrary code execution.

A local attacker with no privileges required (PR:N) can exploit this vulnerability with low complexity (AC:L) and no user interaction (UI:N), as scored at CVSS 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By providing a malicious or misconfigured interface name, the attacker can trigger the overflow before any privilege checks, potentially achieving high-impact confidentiality, integrity, and availability violations, including code execution on the affected system.

The GitHub Security Advisory (GHSA-p47c-2jpr-mpwx) confirms that EVerest version 2026.02.0 addresses the vulnerability with a patch. Security practitioners should upgrade to this version or later to mitigate the risk.

Details

CWE(s)

Affected Products

linuxfoundation
everest
≤ 2026.02.0

CVEs Like This One

CVE-2026-22790Same product: Linuxfoundation Everest
CVE-2026-22593Same product: Linuxfoundation Everest
CVE-2026-33009Same product: Linuxfoundation Everest
CVE-2025-68141Same product: Linuxfoundation Everest
CVE-2026-27828Same product: Linuxfoundation Everest
CVE-2026-27816Same product: Linuxfoundation Everest
CVE-2025-68136Same product: Linuxfoundation Everest
CVE-2025-68133Same product: Linuxfoundation Everest
CVE-2025-68137Same product: Linuxfoundation Everest
CVE-2026-27815Same product: Linuxfoundation Everest

References