The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-5121

CVE-2026-5121: libarchive RCE Vulnerability

CVE-2026-5121 is a remote code execution flaw in libarchive affecting 32-bit systems through integer overflow in zisofs processing. This article covers the technical details, affected versions, impact, and mitigation.

Published: April 2, 2026

CVE-2026-5121 Overview

A critical integer overflow vulnerability has been discovered in libarchive affecting 32-bit systems. The flaw exists in the zisofs block pointer allocation logic when processing ISO9660 images. A remote attacker can exploit this vulnerability by providing a specially crafted ISO9660 image, which triggers an integer overflow leading to a heap buffer overflow. Successful exploitation could allow arbitrary code execution on affected systems.

Critical Impact

Remote attackers can achieve arbitrary code execution on vulnerable 32-bit systems by delivering malicious ISO9660 images, potentially leading to complete system compromise without requiring authentication or user interaction.

Affected Products

  • libarchive (32-bit builds)
  • Systems using libarchive for ISO9660/zisofs processing
  • Applications and utilities integrating libarchive library

Discovery Timeline

  • 2026-03-30 - CVE CVE-2026-5121 published to NVD
  • 2026-03-31 - Last updated in NVD database

Technical Details for CVE-2026-5121

Vulnerability Analysis

This vulnerability is classified as CWE-190 (Integer Overflow or Wraparound). The flaw occurs specifically in libarchive's handling of zisofs (zlib-compressed ISO9660) images on 32-bit architectures. When the library allocates memory for block pointers during zisofs decompression, insufficient validation of size calculations allows an integer overflow condition.

On 32-bit systems, integer arithmetic operations that exceed the maximum representable value wrap around to small values. When this occurs during memory allocation calculations, the library allocates a buffer that is significantly smaller than expected. Subsequent operations that write data into this undersized buffer result in a heap buffer overflow, corrupting adjacent memory regions.

The network attack vector means that exploitation can occur when a victim system processes a malicious ISO9660 image received from a remote source. This could happen through file downloads, email attachments, network file shares, or any application workflow that processes ISO images using libarchive.

Root Cause

The root cause is improper integer overflow checking in the zisofs block pointer allocation code path. When calculating the required buffer size for block pointers, the multiplication of block count and pointer size can overflow on 32-bit systems when processing specially crafted ISO9660 images with manipulated header values. The resulting small allocation leads to heap corruption when the actual block pointer data is written.

Attack Vector

The vulnerability is exploitable over the network without requiring authentication or user interaction. An attacker can deliver a malicious ISO9660 image through various means including:

  • Web downloads where libarchive processes uploaded or retrieved files
  • Email gateways or antivirus solutions that scan archive attachments
  • File sharing services that extract or preview ISO contents
  • Backup and restore utilities processing ISO images
  • Package managers or software distribution systems

The malicious ISO image contains crafted zisofs metadata designed to trigger the integer overflow during block pointer allocation. When a vulnerable application processes the image, the heap overflow occurs, potentially allowing the attacker to overwrite critical heap metadata or application data structures to gain code execution.

Detection Methods for CVE-2026-5121

Indicators of Compromise

  • Unexpected crashes or segmentation faults in applications using libarchive when processing ISO9660 images
  • Memory corruption errors in system logs related to archive extraction operations
  • Unusual ISO9660 files with abnormally large or malformed zisofs metadata
  • Heap corruption detection alerts from security tools during ISO processing

Detection Strategies

  • Monitor for application crashes or abnormal terminations when handling ISO9660 archives
  • Implement file integrity monitoring on systems processing untrusted ISO images
  • Deploy memory corruption detection tools on systems running 32-bit libarchive builds
  • Review system logs for segmentation faults or memory allocation failures in archive-related processes

Monitoring Recommendations

  • Enable core dump analysis for applications using libarchive to detect exploitation attempts
  • Implement sandboxing for ISO9660 processing workflows to contain potential exploits
  • Monitor network traffic for suspicious ISO9660 file transfers to vulnerable systems
  • Configure alerting for unusual memory allocation patterns in archive processing services

How to Mitigate CVE-2026-5121

Immediate Actions Required

  • Update libarchive to the latest patched version addressing CVE-2026-5121
  • Consider migrating vulnerable 32-bit systems to 64-bit architectures where feasible
  • Restrict processing of untrusted ISO9660 images on vulnerable systems until patches are applied
  • Implement network-level filtering for ISO file downloads on critical infrastructure

Patch Information

A fix has been developed to address the integer overflow vulnerability in the zisofs block pointer allocation logic. The patch is tracked in GitHub Pull Request #2934. Organizations should update to the patched version of libarchive as soon as it becomes available through their distribution channels. Additional information is available from the Red Hat CVE Advisory.

Workarounds

  • Disable zisofs support in libarchive if not required for operations
  • Process ISO9660 images only on 64-bit systems where the integer overflow is not exploitable
  • Implement input validation to reject ISO images with suspicious zisofs metadata before libarchive processing
  • Use sandboxed or containerized environments for processing untrusted archive files

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechLibarchive

  • SeverityCRITICAL

  • CVSS Score9.8

  • EPSS Probability0.18%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-190
  • Technical References
  • Red Hat CVE Advisory

  • GitHub Pull Request
  • Related CVEs
  • CVE-2024-26256: Libarchive RCE Vulnerability

  • CVE-2026-5745: libarchive NULL Pointer DoS Vulnerability

  • CVE-2026-4426: libarchive DOS Vulnerability

  • CVE-2026-4424: libarchive Information Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English