Cyber Posture

CVE-2026-24793

Critical

Published: 27 January 2026

Published
27 January 2026
Modified
17 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 18.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24793 is a critical-severity Classic Buffer Overflow (CWE-120) vulnerability in Azerothcore Azerothcore. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely remediation of known software flaws like this buffer overflow in zlib's inflate.c by applying the available patch.

prevent

Implements memory protection mechanisms such as stack canaries and DEP to prevent exploitation of buffer overflows leading to out-of-bounds writes.

prevent

Mandates validation of input sizes prior to buffer copies, directly countering the unchecked input size flaw in zlib decompression.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote unauthenticated buffer overflow (CWE-120/787) in public-facing AzerothCore server component directly enables initial access via exploitation of a network service for RCE/system compromise.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Out-of-bounds Write, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in azerothcore azerothcore-wotlk (deps/zlib modules). This vulnerability is associated with program files inflate.C. This issue affects azerothcore-wotlk: through v4.0.0.

Deeper analysisAI

CVE-2026-24793 is an Out-of-bounds Write vulnerability, classified as a classic buffer overflow due to buffer copy without checking the size of input, affecting the azerothcore-wotlk project. The issue resides in the deps/zlib modules, specifically associated with the inflate.c program file. It impacts azerothcore-wotlk versions through v4.0.0 and is linked to CWE-120 and CWE-787.

With a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), the vulnerability enables exploitation by unauthenticated attackers over the network with low complexity and no user interaction required. Successful exploitation can result in high impacts to confidentiality, integrity, and availability, potentially allowing remote code execution or system compromise on affected instances.

Mitigation is addressed in a patch provided via the GitHub pull request at https://github.com/azerothcore/azerothcore-wotlk/pull/21599, which security practitioners should review and apply to vulnerable deployments.

Details

CWE(s)

Affected Products

azerothcore
azerothcore
≤ 4.0.0

CVEs Like This One

CVE-2025-55599Shared CWE-120, CWE-787
CVE-2024-57578Shared CWE-120, CWE-787
CVE-2025-52221Shared CWE-120, CWE-787
CVE-2024-57703Shared CWE-120, CWE-787
CVE-2025-25664Shared CWE-120, CWE-787
CVE-2025-25663Shared CWE-120, CWE-787
CVE-2025-55611Shared CWE-120, CWE-787
CVE-2025-55602Shared CWE-120, CWE-787
CVE-2025-10792Shared CWE-120, CWE-787
CVE-2025-8243Shared CWE-120, CWE-787

References