CVE-2026-40200
Published: 10 April 2026
Summary
CVE-2026-40200 is a high-severity Always-Incorrect Control Flow Implementation (CWE-670) vulnerability in Libc (inferred from references). Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 5.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the CVE by requiring identification, reporting, and correction of the stack-based memory corruption flaw in vulnerable musl libc versions through timely patching.
Provides comprehensive memory safeguards like stack canaries, ASLR, and non-executable memory to block exploitation of the stack corruption triggered by qsort on large arrays.
Supports detection of the specific musl libc vulnerability via scanning and initiates remediation to prevent exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local stack-based memory corruption in musl libc qsort enables exploitation for privilege escalation (T1068) due to no-privilege requirement, scope change, and high C/I/A impact via memory corruption, though high complexity and impractical array size introduce uncertainty.
NVD Description
An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo…
more
number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).
Deeper analysisAI
CVE-2026-40200 is a stack-based memory corruption vulnerability affecting musl libc versions 0.7.10 through 1.2.6. The issue arises during qsort operations on very large arrays, where the number of elements must exceed about seven million—the 32nd Leonardo number on 32-bit platforms—or the 64th Leonardo number on 64-bit platforms, which is not practical. It stems from incorrectly implemented double-word primitives and is classified under CWE-670.
The vulnerability carries a CVSS v3.1 base score of 8.1 (AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H). Local attackers require no privileges but must overcome high attack complexity to trigger it, potentially achieving high impacts on confidentiality, integrity, and availability with a change in scope through memory corruption.
Advisories and patches are referenced in the musl libc release notes at https://musl.libc.org/releases.html and the oss-security mailing list announcement at https://www.openwall.com/lists/oss-security/2026/04/10/13 or http://www.openwall.com/lists/oss-security/2026/04/10/13. The vulnerability was published on 2026-04-10.
Details
- CWE(s)