CVE-2026-24882
Published: 27 January 2026
Summary
CVE-2026-24882 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Gnupg Gnupg. Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the stack-based buffer overflow in GnuPG tpm2daemon by requiring timely flaw remediation through upgrade to version 2.5.17 or later.
Implements memory protections like stack canaries, ASLR, and non-executable stacks to block exploitation of the stack buffer overflow for arbitrary code execution.
Requires validation of inputs to the PKDECRYPT command in tpm2daemon to prevent buffer overflows from malformed or oversized data.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack-based buffer overflow in local tpm2daemon component enables arbitrary code execution (or DoS) by unprivileged local attacker with no user interaction, directly mapping to exploitation for privilege escalation.
NVD Description
In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
Deeper analysisAI
CVE-2026-24882 is a stack-based buffer overflow vulnerability, classified under CWE-121, affecting GnuPG versions before 2.5.17. The flaw resides in the tpm2daemon component during processing of the PKDECRYPT command for TPM-backed RSA and ECC keys. Published on 2026-01-27, it carries a CVSS v3.1 base score of 8.4.
A local attacker with no privileges required can exploit this vulnerability with low attack complexity and no user interaction. The vector is local (AV:L), unchanged scope (S:U), enabling high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), such as arbitrary code execution or system crashes.
Advisories recommend upgrading to GnuPG 2.5.17 or later to mitigate the issue. Additional details are available in the GnuPG development ticket at https://dev.gnupg.org/T8045 and the OSS-Security mailing list post at https://www.openwall.com/lists/oss-security/2026/01/27/8.
Details
- CWE(s)