Cyber Posture

CVE-2026-2588

Critical

Published: 23 February 2026

Published
23 February 2026
Modified
04 March 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0006 17.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-2588 is a critical-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Timlegge Crypt\. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates timely remediation of identified flaws, directly addressing the integer overflow in Crypt::NaCl::Sodium by requiring patches like commits 557388bdb4da416a56663cda0154b80cd524395c.

detect

Requires vulnerability monitoring and scanning to identify deployments of vulnerable Crypt::NaCl::Sodium versions through 2.001 on 32-bit systems.

detect

Maintains an inventory of system components, enabling location and remediation of systems using the vulnerable Perl module.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Remote unauthenticated network exploitation of the integer overflow in the Perl libsodium binding enables compromise of public-facing applications (T1190) and directly supports application crashes or denial of service via malformed length parameters to cryptographic routines (T1499.004).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw on 32-bit systems. Sodium.xs casts a STRLEN (size_t) to unsigned long long when passing a length pointer to libsodium functions. On 32-bit systems size_t is typically 32-bits while an…

more

unsigned long long is at least 64-bits.

Deeper analysisAI

CVE-2026-2588 is an integer overflow vulnerability (CWE-190) affecting Crypt::NaCl::Sodium versions through 2.001 for Perl, specifically on 32-bit systems. The flaw occurs in the Sodium.xs module, where a STRLEN (size_t) value is cast to an unsigned long long when passing a length pointer to libsodium functions. On 32-bit platforms, size_t is typically 32 bits, while unsigned long long is at least 64 bits, enabling the overflow.

Remote attackers require no privileges or user interaction to exploit this over the network with low complexity, as indicated by the CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H). Successful exploitation can result in high integrity and availability impacts, potentially leading to crashes, denial of service, or manipulation of cryptographic operations due to incorrect length handling in libsodium calls.

Mitigation involves applying patches from the Crypt::NaCl::Sodium repository, such as commits 557388bdb4da416a56663cda0154b80cd524395c and 8cf7f66ba922443e131c9deae1ee00fafe4f62e4, which address the casting issue in Sodium.xs (e.g., around line 2119 in version 2.001 source). Security practitioners should upgrade to a patched version and verify deployments on 32-bit Perl environments using libsodium.

Details

CWE(s)

Affected Products

timlegge
crypt\
\

CVEs Like This One

CVE-2026-30909Same product: Timlegge Crypt\
CVE-2025-1828Same product: Timlegge Crypt\
CVE-2026-41602Shared CWE-190
CVE-2026-27889Shared CWE-190
CVE-2026-40046Shared CWE-190
CVE-2026-23833Shared CWE-190
CVE-2026-41605Shared CWE-190
CVE-2026-37555Shared CWE-190
CVE-2026-25970Shared CWE-190
CVE-2026-30910Shared CWE-190

References