Cyber Posture

CVE-2026-31814

HighPublic PoC

Published: 13 March 2026

Published
13 March 2026
Modified
19 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0003 7.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-31814 is a high-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Protocol Yamux. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 7.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

The CVE describes remote unauthenticated exploitation of an arithmetic overflow in the Yamux stream multiplexer via a crafted WindowUpdate frame, directly causing a panic/crash and denial-of-service. This matches T1499.004 (Application or System Exploitation) under the Endpoint Denial of Service technique.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. From 0.13.0 to before 0.13.9, a specially crafted WindowUpdate can cause arithmetic overflow in send-window accounting, which triggers a panic in the connection state machine. This is remotely…

more

reachable over a normal network connection and does not require authentication. This vulnerability is fixed in 0.13.9.

Deeper analysisAI

CVE-2026-31814 affects Yamux, a stream multiplexer over reliable, ordered connections such as TCP/IP, specifically in the rust-yamux implementation from versions 0.13.0 up to but not including 0.13.9. The vulnerability stems from an arithmetic overflow (CWE-190) in send-window accounting, triggered by a specially crafted WindowUpdate frame. This causes a panic in the connection state machine, rated at CVSS 3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

Any remote attacker can exploit this over a normal network connection without authentication by sending the crafted WindowUpdate frame. Successful exploitation results in a denial-of-service condition, crashing the affected Yamux connection and potentially disrupting services relying on it for stream multiplexing.

The vulnerability is fixed in Yamux version 0.13.9. Security practitioners should upgrade to this version or later. Additional details are available in the GitHub Security Advisory at https://github.com/libp2p/rust-yamux/security/advisories/GHSA-4w32-2493-32g7.

Details

CWE(s)

Affected Products

protocol
yamux
0.13.0 — 0.13.9

CVEs Like This One

CVE-2026-32314Same product: Protocol Yamux
CVE-2026-33040Same vendor: Protocol
CVE-2026-35457Same vendor: Protocol
CVE-2026-35405Same vendor: Protocol
CVE-2026-35092Shared CWE-190
CVE-2026-33666Shared CWE-190
CVE-2026-24173Shared CWE-190
CVE-2026-33662Shared CWE-190
CVE-2026-27951Shared CWE-190
CVE-2026-40385Shared CWE-190

References