Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-3407

CVE-2026-3407: YosysHQ Yosys Buffer Overflow Vulnerability

CVE-2026-3407 is a heap-based buffer overflow flaw in YosysHQ yosys affecting the BLIF File Parser component. Attackers can exploit this locally to compromise system integrity. This article covers affected versions, impact, and mitigation.

Published: March 6, 2026

CVE-2026-3407 Overview

A heap-based buffer overflow vulnerability has been identified in YosysHQ Yosys, an open-source framework for Verilog RTL synthesis. The vulnerability exists in the Yosys::RTLIL::Const::set function within the kernel/rtlil.h file, specifically affecting the BLIF File Parser component. When processing maliciously crafted BLIF files, the application fails to properly validate buffer boundaries, resulting in a heap-based buffer overflow condition that could lead to denial of service or potential memory corruption.

Critical Impact

This heap-based buffer overflow vulnerability in the Yosys synthesis framework could allow a local attacker to cause application crashes or corrupt heap memory through maliciously crafted BLIF files.

Affected Products

  • YosysHQ Yosys up to version 0.62
  • Systems utilizing the BLIF File Parser component
  • Environments processing untrusted BLIF synthesis files

Discovery Timeline

  • 2026-03-02 - CVE-2026-3407 published to NVD
  • 2026-03-02 - Last updated in NVD database

Technical Details for CVE-2026-3407

Vulnerability Analysis

The vulnerability resides in the Yosys::RTLIL::Const::set function located in kernel/rtlil.h. This function is responsible for handling constant value assignments within the Register Transfer Level Intermediate Language (RTLIL) implementation. When the BLIF File Parser processes input data, insufficient bounds checking in the set function allows memory writes beyond the allocated heap buffer boundaries.

The vulnerability is classified under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), which encompasses buffer overflow conditions where data is written outside the intended memory bounds. The attack requires local access to the system and the ability to provide a malicious BLIF file to the Yosys synthesis tool for processing. Notably, the vulnerability exhibits intermittent reproducibility, suggesting it may be dependent on specific memory layout conditions or input characteristics.

Root Cause

The root cause stems from improper boundary validation in the Yosys::RTLIL::Const::set function when handling data from BLIF file parsing operations. The function does not adequately verify that the index or size parameters fall within the allocated buffer bounds before performing memory write operations. This missing validation allows specially crafted BLIF files to trigger out-of-bounds heap memory access.

Attack Vector

The attack vector is local in nature, requiring an attacker to have the ability to provide malicious input files to the Yosys synthesis tool. An attacker could craft a malformed BLIF file containing specific data structures designed to trigger the buffer overflow condition when processed by the vulnerable parser component.

The exploitation scenario involves:

  1. Creating a specially crafted BLIF file with malicious constant value definitions
  2. Having the Yosys tool process the malicious file through normal synthesis operations
  3. The BLIF File Parser invokes the vulnerable Yosys::RTLIL::Const::set function
  4. Heap memory corruption occurs due to out-of-bounds write operations

The vulnerability has been publicly disclosed with proof-of-concept details available in the GitHub PoC Repository. Technical discussion and issue tracking can be found in GitHub Issue #5677.

Detection Methods for CVE-2026-3407

Indicators of Compromise

  • Unexpected crashes or segmentation faults when Yosys processes BLIF files
  • Heap corruption errors or memory allocation failures during synthesis operations
  • Unusual memory consumption patterns when parsing BLIF input files
  • Core dumps generated by the Yosys process containing heap overflow signatures

Detection Strategies

  • Monitor Yosys process execution for abnormal termination or crash events during BLIF file processing
  • Implement file integrity monitoring on BLIF files provided from untrusted sources
  • Deploy AddressSanitizer (ASan) builds in development environments to detect heap overflow conditions
  • Review system logs for repeated Yosys crashes that may indicate exploitation attempts

Monitoring Recommendations

  • Enable crash reporting and analysis for Yosys synthesis processes in production environments
  • Implement input validation for BLIF files before processing through the synthesis pipeline
  • Monitor heap memory usage patterns for anomalies during Yosys execution
  • Configure security tools to alert on memory corruption indicators from EDA tools

How to Mitigate CVE-2026-3407

Immediate Actions Required

  • Update YosysHQ Yosys to a patched version that addresses the heap buffer overflow
  • Restrict Yosys processing to trusted BLIF files from verified sources only
  • Implement sandboxing or containerization for Yosys synthesis operations
  • Review and validate all BLIF files from external sources before processing

Patch Information

The YosysHQ development team has addressed this vulnerability through official patches. Two pull requests have been submitted to fix the issue:

  • GitHub Pull Request #5680 - Initial fix for the buffer overflow
  • GitHub Pull Request #5681 - Additional remediation

Users should update to the latest version of Yosys that incorporates these fixes. The official GitHub Repository for Yosys contains the patched source code and release information.

Workarounds

  • Run Yosys in isolated environments with limited system access and resource constraints
  • Implement input sanitization by validating BLIF file structure before processing
  • Use memory-safe compilation options such as AddressSanitizer for development builds
  • Restrict user permissions for Yosys execution to minimize potential impact
bash
# Configuration example
# Run Yosys with memory limits and isolation
ulimit -v 4194304  # Limit virtual memory to 4GB
ulimit -d 2097152  # Limit data segment size to 2GB

# Use containerized execution for untrusted inputs
docker run --memory=4g --cpus=2 --read-only \
  -v /path/to/input:/input:ro \
  -v /path/to/output:/output \
  yosyshq/yosys yosys -p "read_blif /input/design.blif"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechYosys

  • SeverityMEDIUM

  • CVSS Score4.8

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-119
  • Technical References
  • GitHub Repository for Yosys

  • GitHub Issue #5677

  • GitHub Pull Request #5680

  • GitHub Pull Request #5681

  • GitHub PoC Repository for Yo2

  • VulDB #348302

  • VulDB ID #348302

  • VulDB Submission #763755
  • Latest CVEs
  • CVE-2025-49454: TinySalt Path Traversal Vulnerability

  • CVE-2025-48261: MultiVendorX Information Disclosure Flaw

  • CVE-2025-32119: CardGate WooCommerce SQL Injection Flaw

  • CVE-2025-26879: s2Member Plugin Reflected XSS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English