The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-33846

CVE-2026-33846: GnuTLS Buffer Overflow Vulnerability

CVE-2026-33846 is a heap buffer overflow flaw in GnuTLS DTLS handshake logic that allows remote attackers to trigger memory corruption. This post covers the technical details, affected versions, and mitigation steps.

Published: May 7, 2026

CVE-2026-33846 Overview

CVE-2026-33846 is a heap buffer overflow vulnerability in the Datagram Transport Layer Security (DTLS) handshake fragment reassembly logic of GnuTLS. The flaw resides in the merge_handshake_packet() function, which matches and merges incoming handshake fragments solely by handshake type. The function does not validate that the message_length field stays consistent across fragments belonging to the same logical message. A remote, unauthenticated attacker can send crafted DTLS fragments with conflicting message_length values to trigger an out-of-bounds write on the heap. The vulnerability is classified under [CWE-130: Improper Handling of Length Parameter Inconsistency].

Critical Impact

Remote unauthenticated attackers can cause application crashes or potential heap memory corruption in any service using vulnerable GnuTLS DTLS implementations.

Affected Products

  • GnuTLS DTLS implementations (versions affected per Red Hat advisory)
  • Red Hat Enterprise Linux packages shipping vulnerable GnuTLS builds
  • Applications and services that link against affected GnuTLS DTLS code paths

Discovery Timeline

  • 2026-05-04 - CVE-2026-33846 published to the National Vulnerability Database
  • 2026-05-04 - Last updated in NVD database

Technical Details for CVE-2026-33846

Vulnerability Analysis

GnuTLS supports DTLS, which transports TLS handshake messages over unreliable datagrams. Because handshake messages can exceed the path MTU, DTLS fragments handshake messages and reassembles them at the receiver. Each fragment carries a handshake type, a message_length describing the total reassembled message size, a fragment_offset, and a fragment_length.

The reassembly routine merge_handshake_packet() keys fragment matching only on the handshake type. It allocates a reassembly buffer based on the message_length declared by the first fragment it observes. Subsequent fragments with the same handshake type are merged into that buffer without re-validating that their message_length field matches the original.

When a later fragment declares a larger message_length and a fragment_offset plus fragment_length exceeding the originally allocated buffer, the merge operation writes past the end of the heap allocation. The result is heap corruption that can crash the process or, depending on heap layout, alter adjacent allocations.

Root Cause

The root cause is improper handling of length parameter inconsistency [CWE-130]. The implementation trusts the message_length of the first fragment as authoritative and omits a consistency check when later fragments arrive. Bounds checks during the copy operation reference the original allocation size but do not reject fragments whose declared offsets and lengths exceed it.

Attack Vector

An attacker reaches the vulnerable code path by initiating a DTLS handshake with any service that uses GnuTLS as its DTLS provider. The attacker sends an initial handshake fragment with a small message_length to control the allocation size. The attacker then sends additional fragments of the same handshake type with a larger message_length and offsets crafted to write beyond the allocated buffer. No authentication or prior session state is required, and the entire attack occurs over UDP during the initial handshake.

No public proof-of-concept exploit code is currently available. Refer to the Red Hat Bugzilla #2450625 entry and the Red Hat CVE-2026-33846 page for additional technical detail as it is published.

Detection Methods for CVE-2026-33846

Indicators of Compromise

  • Unexpected crashes, SIGSEGV, or SIGABRT events in processes linked against libgnutls while handling DTLS traffic.
  • Glibc heap corruption messages such as malloc(): corrupted or free(): invalid pointer in logs of DTLS-enabled services.
  • DTLS handshake records from a single peer where successive fragments of the same handshake type carry differing message_length values.

Detection Strategies

  • Inspect DTLS traffic at the network layer for handshake fragments where message_length is inconsistent across fragments sharing the same handshake type and epoch.
  • Deploy IDS/IPS signatures that flag DTLS ClientHello or Certificate fragment sequences with conflicting length declarations.
  • Build SIEM correlation rules that join DTLS service crash events with inbound UDP DTLS traffic from the same source within a short window.

Monitoring Recommendations

  • Track GnuTLS package versions across the fleet and alert on hosts running builds prior to the fix referenced in RHSA-2026:13274.
  • Monitor process restart counts and core dump generation for services exposing DTLS, including OpenConnect, CoAP gateways, and SIP/RTP endpoints.
  • Capture and retain DTLS handshake metadata at perimeter sensors to support post-incident reconstruction of fragment sequences.

How to Mitigate CVE-2026-33846

Immediate Actions Required

  • Inventory all systems running GnuTLS and identify services that accept DTLS traffic, including VPN concentrators, IoT brokers, and media gateways.
  • Apply the vendor-supplied GnuTLS update from RHSA-2026:13274 or the equivalent patch from your Linux distribution.
  • Restart all services linked against libgnutls after patching to ensure the updated library is loaded.

Patch Information

Red Hat has issued RHSA-2026:13274 addressing the heap buffer overflow in merge_handshake_packet(). The fix enforces that message_length is consistent across all fragments belonging to the same logical handshake message and rejects fragments whose declared bounds exceed the allocated reassembly buffer. Customers on other distributions should track their vendor advisories and upgrade GnuTLS to the corresponding fixed release.

Workarounds

  • Restrict inbound UDP access to DTLS-enabled services using firewall rules, allowing only known peer addresses where feasible.
  • Where business requirements permit, disable DTLS and require TLS over TCP until the GnuTLS update can be deployed.
  • Place affected services behind a DTLS-aware proxy or VPN concentrator that performs handshake validation independent of GnuTLS.
bash
# Example: update GnuTLS on Red Hat Enterprise Linux
sudo dnf update gnutls

# Verify the installed version after patching
rpm -q gnutls

# Identify running processes still using the pre-patch library
sudo lsof -n 2>/dev/null | grep -E 'libgnutls.*\(deleted\)'

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechGnutls

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-130
  • Technical References
  • Red Hat Security Advisory RHSA-2026:13274

  • Red Hat CVE-2026-33846 Information

  • Red Hat Bugzilla #2450625
  • Related CVEs
  • CVE-2025-9820: GnuTLS Buffer Overflow Vulnerability

  • CVE-2026-1584: GnuTLS DoS Vulnerability

  • CVE-2025-14831: GnuTLS DoS Vulnerability via Malicious Certificates

  • CVE-2025-6395: GnuTLS NULL Pointer Dereference Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English