Cyber Posture

CVE-2026-31963

High

Published: 18 March 2026

Published
18 March 2026
Modified
19 March 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
EPSS Score 0.0005 16.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-31963 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Htslib Htslib. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 16.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely flaw remediation by updating HTSlib to patched versions (1.23.1, 1.22.2, 1.21.1) that fix the heap buffer overflow in CRAM feature decoding.

prevent

Implements memory protections like ASLR, DEP, and heap hardening that directly mitigate exploitation of the heap buffer overflow for arbitrary code execution.

prevent

Enforces validation of input CRAM files to reject malformed features that could trigger the out-by-one error during reference-based decompression.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Heap buffer overflow in CRAM file parsing enables RCE when a user opens a crafted malicious file (T1204.002), which is the classic client-side exploitation vector (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. As one method of removing redundant data, CRAM uses reference-based compression so that instead of storing the full…

more

sequence for each alignment record it stores a location in an external reference sequence along with a list of differences to the reference at that location as a sequence of "features". When decoding these features, an out-by-one error in a test for CRAM features that appear beyond the extent of the CRAM record sequence could result in an invalid write of one attacker-controlled byte beyond the end of a heap buffer. Exploiting this bug causes a heap buffer overflow. If a user opens a file crafted to exploit this issue, it could lead to the program crashing, or overwriting of data and heap structures in ways not expected by the program. It may be possible to use this to obtain arbitrary code execution. Versions 1.23.1, 1.22.2 and 1.21.1 include fixes for this issue. There is no workaround for this issue.

Deeper analysisAI

CVE-2026-31963 is a heap buffer overflow vulnerability in HTSlib, a C library for reading and writing bioinformatics file formats such as CRAM, which stores compressed DNA sequence alignment data using reference-based compression. The issue stems from an out-by-one error in a test for CRAM features that extend beyond the record sequence extent, resulting in an invalid write of one attacker-controlled byte past the end of a heap buffer during feature decoding. This affects HTSlib versions prior to the patches in 1.23.1, 1.22.2, and 1.21.1, and is classified under CWE-122 (Heap-based Buffer Overflow), CWE-129 (Improper Validation of Array Index), and CWE-787 (Out-of-bounds Write), with a CVSS v3.1 base score of 8.1.

An attacker can exploit this vulnerability by crafting a malicious CRAM file and tricking a user into opening it with software linked to a vulnerable HTSlib version, such as bioinformatics tools like samtools. The attack is network-vector (AV:N) with low complexity (AC:L), requires no privileges (PR:N) but user interaction (UI:R), and has no scope change (S:U). Successful exploitation causes a heap buffer overflow, potentially leading to program crashes, unexpected overwriting of heap data and structures, or arbitrary code execution.

The HTSlib GitHub security advisory (GHSA-qgqh-h2q9-7w3c) and commit 8bcc9907be0f945ddc31796d64f078fa05456acd detail the fix, backported to maintenance branches for versions 1.23.1, 1.22.2, and 1.21.1. There is no workaround available, so users should update to a patched version immediately.

Details

CWE(s)

Affected Products

htslib
htslib
1.23 · ≤ 1.21.1 · 1.22 — 1.22.2

CVEs Like This One

CVE-2026-31962Same product: Htslib Htslib
CVE-2026-31969Same product: Htslib Htslib
CVE-2026-31968Same product: Htslib Htslib
CVE-2026-31970Same product: Htslib Htslib
CVE-2026-31971Same product: Htslib Htslib
CVE-2026-31965Same product: Htslib Htslib
CVE-2026-31967Same product: Htslib Htslib
CVE-2026-31966Same product: Htslib Htslib
CVE-2026-31964Same product: Htslib Htslib
CVE-2026-21357Shared CWE-122, CWE-787

References