Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-27014

CVE-2026-27014: NanaZip Buffer Overflow Vulnerability

CVE-2026-27014 is a buffer overflow flaw in NanaZip that causes infinite loops and stack overflows via malicious ROMFS archives. This article covers the technical details, affected versions 5.0.1252.0-6.0.1630.0, and patches.

Published: February 20, 2026

CVE-2026-27014 Overview

NanaZip is an open source file archiver that contains a denial of service vulnerability in its ROMFS archive parser. Starting in version 5.0.1252.0 and prior to version 6.0.1630.0, circular NextOffset chains cause an infinite loop, and deeply nested directories cause unbounded recursion leading to a stack overflow. This vulnerability allows attackers to craft malicious ROMFS archives that, when processed by NanaZip, can cause the application to hang indefinitely or crash due to resource exhaustion.

Critical Impact

Processing a specially crafted ROMFS archive can trigger an infinite loop or stack overflow, causing NanaZip to become unresponsive or crash, resulting in denial of service.

Affected Products

  • NanaZip versions 5.0.1252.0 through 6.0.1630.0 (exclusive)
  • Systems using NanaZip for ROMFS archive extraction

Discovery Timeline

  • 2026-02-19 - CVE CVE-2026-27014 published to NVD
  • 2026-02-19 - Last updated in NVD database

Technical Details for CVE-2026-27014

Vulnerability Analysis

This vulnerability is classified under CWE-674 (Uncontrolled Recursion), affecting the ROMFS archive parsing functionality in NanaZip. The vulnerability manifests through two distinct attack vectors within the ROMFS parser implementation.

The first attack vector involves circular NextOffset chains in ROMFS archive structures. When parsing the archive directory structure, the parser follows NextOffset pointers to traverse entries. A malicious archive can be crafted with circular references where the offset chain loops back to a previous entry, causing the parser to enter an infinite loop.

The second attack vector exploits the recursive nature of directory traversal. The ROMFS format supports nested directory structures, and the parser handles these through recursive function calls. When processing an archive with excessively deep directory nesting, the parser exhausts the available stack space, triggering a stack overflow and application crash.

Root Cause

The root cause of this vulnerability is insufficient input validation in the ROMFS archive parser. Specifically:

  1. Missing cycle detection: The parser does not track visited offsets when following NextOffset chains, allowing circular references to create infinite loops.

  2. Unbounded recursion depth: The recursive directory traversal implementation lacks depth limiting, allowing deeply nested structures to exhaust stack space through uncontrolled recursion.

These issues stem from trusting archive metadata without proper bounds checking or cycle detection mechanisms.

Attack Vector

The attack requires local access where a user must be tricked into opening a maliciously crafted ROMFS archive file with NanaZip. An attacker could distribute the malicious archive through various means such as email attachments, file sharing platforms, or compromised download sites.

The vulnerability mechanism involves crafting a ROMFS archive with either circular NextOffset pointers that create an endless loop when the parser attempts to enumerate directory entries, or creating an archive with hundreds or thousands of nested directories that exhaust the call stack during recursive traversal. See the GitHub Security Advisory for technical details.

Detection Methods for CVE-2026-27014

Indicators of Compromise

  • NanaZip process consuming 100% CPU for extended periods when opening archive files
  • Application crashes with stack overflow exceptions during archive extraction
  • System logs indicating NanaZip unresponsive or terminated abnormally
  • ROMFS archive files with unusually small file sizes but claiming to contain deeply nested structures

Detection Strategies

  • Monitor for NanaZip processes with abnormally high CPU utilization during file operations
  • Implement endpoint detection rules for stack overflow exceptions in NanaZip processes
  • Deploy file inspection capabilities to identify ROMFS archives with suspicious directory depth or circular offset patterns
  • Enable application crash monitoring for NanaZip executable

Monitoring Recommendations

  • Configure alerts for NanaZip application hangs or crashes in enterprise environments
  • Monitor for repeated NanaZip process restarts which may indicate exploitation attempts
  • Implement logging for archive file operations to identify potentially malicious files

How to Mitigate CVE-2026-27014

Immediate Actions Required

  • Upgrade NanaZip to version 6.0.1630.0 or later immediately
  • Avoid opening ROMFS archives from untrusted sources until patched
  • Consider temporarily disabling ROMFS archive support if possible
  • Implement endpoint protection to detect and block malicious archive files

Patch Information

The NanaZip development team has addressed this vulnerability in version 6.0.1630.0. The patch implements proper cycle detection for NextOffset chain traversal and adds recursion depth limits for directory parsing. Users should update to the latest version through the official NanaZip distribution channels. For more information, refer to the GitHub Security Advisory.

Workarounds

  • Use alternative archive utilities for ROMFS file extraction until NanaZip is updated
  • Implement network-level filtering to block ROMFS archive attachments from untrusted sources
  • Configure application sandboxing to limit impact of potential denial of service
  • Educate users to avoid opening archive files from untrusted sources

Organizations should prioritize upgrading to the patched version as the most effective mitigation strategy.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechNanazip

  • SeverityMEDIUM

  • CVSS Score5.1

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-674
  • Technical References
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-27711: NanaZip Buffer Overflow Vulnerability

  • CVE-2026-27710: NanaZip Denial-of-Service Vulnerability

  • CVE-2026-27709: NanaZip Information Disclosure Vulnerability

  • CVE-2026-27114: NanaZip ROMFS Parser DOS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English