Cyber Posture

CVE-2026-26738

High

Published: 10 March 2026

Published
10 March 2026
Modified
01 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0008 22.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26738 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Gruppotim (inferred from references). Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 22.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, testing, and installation of software updates to remediate the specific buffer overflow vulnerability in SpaceSniffer.

prevent

Implements memory protections such as DEP and ASLR to prevent arbitrary code execution from buffer overflow exploits in vulnerable applications like SpaceSniffer.

preventdetect

Deploys malicious code protection scanning files in real-time upon opening to detect and block crafted .sns snapshot files exploiting the buffer overflow.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Buffer overflow in client-side app enables arbitrary code execution via crafted file opened by user (T1204.002); directly matches exploitation of client software vulnerability for code execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows a remote attacker to execute arbitrary code via a crafted .sns snapshot file.

Deeper analysisAI

CVE-2026-26738 is a buffer overflow vulnerability (CWE-121) affecting Uderzo Software SpaceSniffer version 2.0.5.18. Published on 2026-03-10, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). The flaw enables a remote attacker to execute arbitrary code by convincing a user to open a crafted .sns snapshot file within the application.

Exploitation requires local access to the target system (AV:L) and low complexity (AC:L), with no privileges needed (PR:N) but user interaction required (UI:R), such as opening the malicious file. Successful exploitation grants high-impact confidentiality, integrity, and availability effects (C:H/I:H/A:H) without changing scope (S:U), potentially allowing arbitrary code execution in the context of the affected application.

Details

CWE(s)

Affected Products

Gruppotim
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-46411Shared CWE-121
CVE-2026-32925Shared CWE-121
CVE-2026-0660Shared CWE-121
CVE-2026-27267Shared CWE-121
CVE-2025-54481Shared CWE-121
CVE-2025-24075Shared CWE-121
CVE-2026-27821Shared CWE-121
CVE-2026-42468Shared CWE-121
CVE-2026-32928Shared CWE-121
CVE-2025-54483Shared CWE-121

References