Cyber Posture

CVE-2026-40396

Medium

Published: 12 April 2026

Published
12 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L
EPSS Score 0.0002 3.6th percentile
Risk Priority 8 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-40396 is a medium-severity Always-Incorrect Control Flow Implementation (CWE-670) vulnerability in Vinyl-Cache Vinyl Cache. Its CVSS base score is 4.0 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 3.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the vulnerability by requiring identification, reporting, and correction of the specific workspace overflow flaw through patching to Varnish Cache 9.0.1 or later.

prevent

Implements denial-of-service protections tailored to prevent network-accessible attacks exploiting HTTP/1 pipelining to trigger workspace overflows and server panics.

prevent

Manages and monitors resource allocation, such as workspace memory, to mitigate overflows during request transitions in pipelined HTTP/1 sessions.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

The vulnerability is a software flaw in Varnish Cache that can be directly exploited by a network client to trigger workspace overflow, daemon panic, and crash, enabling application or system exploitation for denial of service.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Varnish Cache 9 before 9.0.1 allows a "workspace overflow" denial of service (daemon panic) after timeout_linger. A malicious client could send an HTTP/1 request, wait long enough until the session releases its worker thread (timeout_linger) and resume traffic before the…

more

session is closed (timeout_idle) sending more than one request at once to trigger a pipelining operation between requests. This vulnerability affecting Varnish Cache 9.0.0 emerged from a port of the Varnish Enterprise non-blocking architecture for HTTP/2. New code was needed to adapt to a more recent workspace API that formalizes the pipelining operation. In addition to the workspace change on the Varnish Cache side, other differences created merge conflicts, like partial support for trailers in Varnish Enterprise. The conflict resolution missed one code path configuring pipelining to perform a complete workspace rollback, losing the guarantee that prefetched data would fit inside workspace_client during the transition from one request to the next. This can result in a workspace overflow, triggering a panic and crashing the Varnish server.

Deeper analysisAI

CVE-2026-40396 is a workspace overflow vulnerability in Varnish Cache versions 9 before 9.0.1, specifically affecting Varnish Cache 9.0.0. The issue enables a denial-of-service condition through a daemon panic triggered after the timeout_linger period. It stems from adaptations made while porting Varnish Enterprise's non-blocking architecture for HTTP/2 to the open-source Varnish Cache, including changes to a more recent workspace API that formalizes pipelining operations. Merge conflicts, such as partial support for trailers in Varnish Enterprise, led to a missed code path for complete workspace rollback during transitions between requests, allowing prefetched data to exceed workspace_client limits.

A network-accessible malicious client can exploit this vulnerability by sending an HTTP/1 request, waiting until the session releases its worker thread due to timeout_linger, and then resuming traffic before the session closes via timeout_idle. By sending more than one request at once, the attacker triggers a pipelining operation between requests, resulting in a workspace overflow that causes the Varnish server to panic and crash. The CVSS v3.1 base score of 4.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L) reflects network accessibility with no privileges required, high attack complexity, changed scope, and low availability impact, with no confidentiality or integrity effects.

The Varnish Cache GitHub release notes for version 9.0.1 address this vulnerability by fixing the missed code path in pipelining to ensure proper workspace rollback. Security practitioners should update to Varnish Cache 9.0.1 or later, as detailed in the release tag at https://github.com/varnish/varnish/releases/tag/varnish-9.0.1. Additional discussion is available in the related issue at https://github.com/varnish/varnish/issues/15.

Details

CWE(s)

Affected Products

vinyl-cache
vinyl cache
9.0.0

CVEs Like This One

CVE-2026-40394Same product: Vinyl-Cache Vinyl Cache
CVE-2026-34475Same product: Vinyl-Cache Vinyl Cache
CVE-2025-58136Shared CWE-670
CVE-2026-34946Shared CWE-670
CVE-2026-26267Shared CWE-670
CVE-2025-21607Shared CWE-670
CVE-2025-43359Shared CWE-670
CVE-2026-40960Shared CWE-670
CVE-2026-33011Shared CWE-670
CVE-2026-40200Shared CWE-670

References