Cyber Posture

CVE-2026-4437

HighPublic PoC

Published: 20 March 2026

Published
20 March 2026
Modified
07 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0007 20.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-4437 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Gnu Glibc. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 20.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE by requiring identification, reporting, and correction of the glibc flaw through timely patching of affected versions 2.34 to 2.43.

detect

Enables scanning and monitoring to identify systems running vulnerable glibc versions affected by the DNS response parsing flaw.

prevent

Provides secure recursive or caching DNS resolvers that validate responses, mitigating crafted DNS packets exploiting the glibc parsing violation.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Vulnerability enables remote crafted DNS responses to trigger out-of-bounds read crashes in glibc DNS functions (gethostbyaddr), directly facilitating application/system exploitation for endpoint denial of service (high availability impact, no auth/UI required).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the…

more

DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

Deeper analysisAI

CVE-2026-4437 is a vulnerability in the GNU C Library (glibc) versions 2.34 through 2.43. It affects applications calling the gethostbyaddr or gethostbyaddr_r functions when nsswitch.conf is configured to use the library's DNS backend. A crafted response from the configured DNS server can violate the DNS specification, causing the application to treat a non-answer section of the DNS response as a valid answer. The issue is classified as CWE-125 (Out-of-bounds Read) with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

A remote attacker can exploit this vulnerability without privileges or user interaction by controlling or spoofing responses from the target system's configured DNS server. The low attack complexity enables network-based exploitation, resulting in high availability impact, such as application crashes or denial of service.

Mitigation details are documented in the Sourceware Bugzilla advisory at https://sourceware.org/bugzilla/show_bug.cgi?id=34014.

Details

CWE(s)

Affected Products

gnu
glibc
2.34 — 2.43

CVEs Like This One

CVE-2025-15281Same product: Gnu Glibc
CVE-2026-4046Same product: Gnu Glibc
CVE-2026-5928Same product: Gnu Glibc
CVE-2026-5450Same product: Gnu Glibc
CVE-2026-0915Same product: Gnu Glibc
CVE-2026-0861Same product: Gnu Glibc
CVE-2026-5435Same product: Gnu Glibc
CVE-2025-69649Same vendor: Gnu
CVE-2025-13151Same vendor: Gnu
CVE-2025-69650Same vendor: Gnu

References