The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-26264

CVE-2026-26264: BACnet Stack DoS Vulnerability

CVE-2026-26264 is a denial-of-service flaw in BACnet Stack that allows attackers to crash systems via malformed WriteProperty requests. This post covers technical details, affected versions, and mitigation steps.

Published: February 20, 2026

CVE-2026-26264 Overview

CVE-2026-26264 is a critical integer underflow vulnerability affecting the BACnet Stack, an open source BACnet protocol stack C library designed for embedded systems. The vulnerability exists in the WriteProperty request decoding functionality, where a malformed request can trigger a length underflow, leading to an out-of-bounds read and subsequent application crash resulting in a Denial of Service (DoS) condition.

Critical Impact

Attackers can remotely crash BACnet-enabled embedded systems and building automation controllers by sending specially crafted WriteProperty requests, potentially disrupting critical infrastructure and industrial control systems.

Affected Products

  • BACnet Stack versions prior to 1.5.0rc4
  • BACnet Stack versions prior to 1.4.3rc2
  • BACnet Stack 1.5.0rc1, 1.5.0rc2, 1.5.0rc3, and 1.4.3rc1

Discovery Timeline

  • 2026-02-13 - CVE-2026-26264 published to NVD
  • 2026-02-18 - Last updated in NVD database

Technical Details for CVE-2026-26264

Vulnerability Analysis

This vulnerability stems from improper validation when decoding the optional priority context tag in WriteProperty service requests. The flaw exists within the wp_decode_service_request function in wp.c and similarly in bacaction.c. When processing the APDU (Application Protocol Data Unit), the code calculates the remaining buffer size by subtracting apdu_size from apdu_len, but fails to validate that apdu_size is less than or equal to apdu_len before performing this subtraction.

The integer underflow occurs because unsigned integer arithmetic wraps around when the result would be negative. If a truncated or malformed APDU reaches the vulnerable code path, the subtraction apdu_len - apdu_size underflows, producing an extremely large positive value. This oversized value is then passed to bacnet_unsigned_context_decode, which attempts to read far beyond the allocated buffer boundaries.

Root Cause

The root cause is a classic integer underflow vulnerability caused by incorrect operand ordering in a subtraction operation. The developers mistakenly used apdu_len - apdu_size instead of the correct apdu_size - apdu_len when calculating the remaining buffer length for context tag decoding. This arithmetic error means that when apdu_size > apdu_len (which can occur with truncated packets), the unsigned subtraction wraps around to a very large value rather than producing an error or negative result.

Attack Vector

An attacker can exploit this vulnerability remotely over the network by sending a specially crafted BACnet WriteProperty request to any device running the vulnerable BACnet Stack library. The attack requires no authentication or user interaction, making it particularly dangerous for exposed building automation systems and industrial control environments.

The attacker would craft a malformed WriteProperty request with a truncated APDU that reaches the priority context tag decoding path. When the vulnerable code processes this malformed request, the integer underflow triggers an out-of-bounds read, causing the application to crash.

c
// Vulnerable code in wp.c - incorrect operand order
    }
    if ((unsigned)apdu_len < apdu_size) {
        len = bacnet_unsigned_context_decode(
-            &apdu[apdu_len], apdu_len - apdu_size, 4, &unsigned_value);
+            &apdu[apdu_len], apdu_size - apdu_len, 4, &unsigned_value);
        if (len > 0) {
            apdu_len += len;
            if ((unsigned_value >= BACNET_MIN_PRIORITY) &&

Source: GitHub Commit

c
// Vulnerable code in bacaction.c - same pattern
    apdu_len += len;
    /* priority [5] Unsigned (1..16) OPTIONAL */
    len = bacnet_unsigned_context_decode(
-        &apdu[apdu_len], apdu_len - apdu_size, 5, &unsigned_value);
+        &apdu[apdu_len], apdu_size - apdu_len, 5, &unsigned_value);
    if (len > 0) {
        apdu_len += len;
        if ((unsigned_value >= BACNET_MIN_PRIORITY) &&

Source: GitHub Commit

Detection Methods for CVE-2026-26264

Indicators of Compromise

  • Unexpected crashes or restarts of BACnet-enabled devices and controllers
  • Malformed BACnet WriteProperty requests with truncated APDUs appearing in network traffic
  • Segmentation faults or access violation errors in logs related to wp_decode_service_request or bacnet_unsigned_context_decode functions
  • Sudden unavailability of building automation or industrial control systems using BACnet protocol

Detection Strategies

  • Deploy network intrusion detection systems (IDS) with rules to identify malformed BACnet WriteProperty requests with abnormal APDU lengths
  • Implement BACnet protocol-aware deep packet inspection to detect truncated or malformed service requests
  • Monitor system logs for crash reports and segmentation faults originating from BACnet Stack components
  • Establish baseline network behavior for BACnet traffic and alert on anomalous patterns

Monitoring Recommendations

  • Enable verbose logging on BACnet controllers and gateways to capture protocol-level errors
  • Configure SIEM rules to correlate multiple BACnet device failures that could indicate active exploitation
  • Implement network segmentation monitoring to detect unauthorized BACnet traffic from untrusted network segments
  • Set up automated alerts for any BACnet device crashes or service interruptions

How to Mitigate CVE-2026-26264

Immediate Actions Required

  • Upgrade BACnet Stack to version 1.5.0rc4 or 1.4.3rc2 immediately
  • Isolate vulnerable BACnet devices behind firewalls and restrict network access to trusted sources only
  • Review network segmentation to ensure BACnet traffic is not exposed to untrusted networks
  • Implement network-level filtering to block malformed BACnet requests if patching is not immediately possible

Patch Information

The vulnerability has been fixed in BACnet Stack versions 1.5.0rc4 and 1.4.3rc2. The fix corrects the operand order in the subtraction operation from apdu_len - apdu_size to apdu_size - apdu_len, ensuring proper bounds checking before decoding context tags.

The security patch is available at the GitHub Commit. Additional details can be found in the GitHub Security Advisory.

Workarounds

  • Implement network access control lists (ACLs) to restrict BACnet UDP port 47808 access to authorized systems only
  • Deploy a BACnet-aware application firewall or protocol gateway that validates request integrity before forwarding
  • Consider temporarily disabling WriteProperty service on critical devices if the functionality is not essential
  • Use VPN or encrypted tunnels for any remote BACnet communications
bash
# Configuration example - Restrict BACnet traffic using iptables
# Allow BACnet traffic only from trusted management network (example: 10.0.1.0/24)
iptables -A INPUT -p udp --dport 47808 -s 10.0.1.0/24 -j ACCEPT
iptables -A INPUT -p udp --dport 47808 -j DROP

# Log blocked BACnet connection attempts
iptables -A INPUT -p udp --dport 47808 -j LOG --log-prefix "BACnet-BLOCKED: "

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechBacnet Stack

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-125
  • Vendor Resources
  • GitHub Commit Log

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-21878: BACnet Stack Path Traversal Vulnerability

  • CVE-2026-21870: BACnet Stack Buffer Overflow Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English