Cyber Posture

CVE-2026-3441

Medium

Published: 16 March 2026

Published
16 March 2026
Modified
20 March 2026
KEV Added
Patch
CVSS Score 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
EPSS Score 0.0001 0.3th percentile
Risk Priority 12 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-3441 is a medium-severity Out-of-bounds Read (CWE-125) vulnerability in Redhat Enterprise Linux. Its CVSS base score is 6.1 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 0.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Malicious File (T1204.002).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Vulnerability is triggered locally by tricking a user into processing a crafted malicious XCOFF object file with Binutils tools (e.g., linker), directly enabling user execution via malicious file delivery.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A flaw was found in GNU Binutils. This heap-based buffer overflow vulnerability, specifically an out-of-bounds read in the bfd linker, allows an attacker to gain access to sensitive information. By convincing a user to process a specially crafted XCOFF object…

more

file, an attacker can trigger this flaw, potentially leading to information disclosure or an application level denial of service.

Deeper analysisAI

CVE-2026-3441 is a heap-based buffer overflow vulnerability, specifically an out-of-bounds read, in the bfd linker component of GNU Binutils. This flaw affects GNU Binutils, a collection of binary utilities commonly used for manipulating object files and binaries across various Unix-like systems. Published on 2026-03-16, it is rated with a CVSS v3.1 base score of 6.1 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L) and maps to CWE-125 (Out-of-bounds Read).

An attacker can exploit this vulnerability locally by convincing a user or administrator to process a specially crafted XCOFF object file using affected Binutils tools. No privileges are required (PR:N), but it demands low complexity and user interaction, such as opening or linking the malicious file. Successful exploitation enables high-impact confidentiality violations through access to sensitive information or low-impact application-level denial of service.

For mitigation details, security practitioners should refer to the Red Hat security advisory at https://access.redhat.com/security/cve/CVE-2026-3441 and the associated Bugzilla entry at https://bugzilla.redhat.com/show_bug.cgi?id=2443826, which provide guidance on patches and workarounds.

Details

CWE(s)

Affected Products

gnu
binutils
all versions
redhat
openshift container platform
4.0
redhat
enterprise linux
10.0, 6.0, 7.0, 8.0, 9.0

CVEs Like This One

CVE-2026-3442Same product: Gnu Binutils
CVE-2026-5673Same product: Redhat Enterprise Linux
CVE-2025-0678Same product: Redhat Enterprise Linux
CVE-2025-32990Same product: Redhat Enterprise Linux
CVE-2026-33845Same product: Redhat Enterprise Linux
CVE-2024-45782Same product: Redhat Enterprise Linux
CVE-2025-32988Same product: Redhat Enterprise Linux
CVE-2025-64735Shared CWE-125
CVE-2026-27294Shared CWE-125
CVE-2026-32927Shared CWE-125

References