The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-5265

CVE-2026-5265: ICMP Handler Buffer Overflow Vulnerability

CVE-2026-5265 is a buffer overflow flaw in ICMP error handling that allows attackers to trigger heap memory disclosure through malformed packets. This article covers technical details, impact, and mitigation steps.

Published: April 30, 2026

CVE-2026-5265 Overview

CVE-2026-5265 is an Out-of-Bounds Read vulnerability in the OVN (Open Virtual Network) controller's ICMP error response handler. When generating ICMP Destination Unreachable or Packet Too Big responses, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. This allows a malicious VM to craft packets with inflated length fields that trigger heap memory disclosure when ICMP errors are generated.

Critical Impact

A VM can exfiltrate sensitive heap memory contents from the ovn-controller process by sending specially crafted packets with inflated IP length fields, potentially exposing cryptographic keys, credentials, or other sensitive data from adjacent memory regions.

Affected Products

  • OVN (Open Virtual Network) Controller
  • Red Hat OpenStack Platform (affected versions addressed in RHSA-2026:11694 through RHSA-2026:11702)
  • Linux distributions utilizing OVN for network virtualization

Discovery Timeline

  • April 20, 2026 - Vulnerability discussed on OpenWall OSS-Security mailing list
  • April 24, 2026 - CVE-2026-5265 published to NVD
  • April 29, 2026 - Last updated in NVD database

Technical Details for CVE-2026-5265

Vulnerability Analysis

This vulnerability stems from improper length validation in the ICMP error response generation code path within ovn-controller. The root issue is classified as CWE-130 (Improper Handling of Length Parameter Inconsistency), where the software trusts attacker-controlled length values without bounds checking.

When a packet triggers an ICMP error condition (such as hitting a reject ACL rule), the ovn-controller constructs an ICMP Destination Unreachable or Packet Too Big message. Per RFC 792 and RFC 4443, these ICMP error messages include a portion of the original offending packet in the message body to help the sender identify which packet caused the error.

The vulnerable code path reads the IP header's declared length field (ip_tot_len for IPv4 or ip6_plen for IPv6) and uses this value to determine how many bytes to copy from the original packet into the ICMP response. However, this self-declared length is not validated against the actual buffer size containing the packet data.

Root Cause

The vulnerability exists because the ICMP error generation routine blindly trusts the IP header's length field without performing bounds validation. In a properly formed packet, the IP total length accurately reflects the packet size. However, an attacker can craft a short packet (e.g., 64 bytes) while setting the IP length field to a much larger value (e.g., 1500 bytes). When the ICMP handler attempts to copy data based on this inflated length, it reads beyond the valid packet buffer into adjacent heap memory.

This is a classic instance of CWE-130 where length parameter inconsistency between declared and actual sizes leads to memory disclosure. The fix requires comparing the IP header's declared length against the actual packet buffer size and using the smaller of the two values.

Attack Vector

The attack is network-accessible and requires the attacker to have control of a VM within the OVN-managed network. The exploitation sequence involves:

  1. The attacker crafts a network packet with a small actual payload but an artificially inflated IP length field
  2. The packet is sent to a destination that will trigger an ICMP error response (e.g., a port blocked by a reject ACL)
  3. The ovn-controller generates an ICMP error message, reading beyond the packet buffer based on the fake length
  4. The ICMP response containing leaked heap memory is sent back to the attacker's VM
  5. The attacker extracts the heap memory contents from the ICMP payload

This attack can be repeated to systematically leak heap memory from the ovn-controller process, potentially exposing sensitive information such as cryptographic materials, authentication tokens, or data from other network flows being processed.

Detection Methods for CVE-2026-5265

Indicators of Compromise

  • Unusual ICMP error packets with payloads larger than expected for the triggering packet size
  • Network traffic containing ICMP Destination Unreachable or Packet Too Big messages with anomalous data patterns in the payload
  • VMs sending packets with mismatched actual size versus IP header declared length
  • Increased ICMP error generation rates from ovn-controller processes

Detection Strategies

  • Monitor for packets where the actual frame size does not match the IP header's declared total length field
  • Implement network flow analysis to detect VMs repeatedly triggering ICMP error conditions with malformed packets
  • Deploy deep packet inspection to identify ICMP error responses containing heap memory patterns or recognizable data structures
  • Review ovn-controller logs for unusual packet processing errors or memory-related warnings

Monitoring Recommendations

  • Enable packet capture on OVN gateway nodes to analyze ICMP error traffic patterns
  • Configure network monitoring tools to alert on IP length field anomalies
  • Implement flow-based analysis to identify VMs generating suspicious ICMP-triggering traffic
  • Monitor ovn-controller process memory usage for potential correlation with exploitation attempts

How to Mitigate CVE-2026-5265

Immediate Actions Required

  • Apply the security patches referenced in Red Hat Security Advisories RHSA-2026:11694 through RHSA-2026:11702
  • Review ACL configurations and consider temporarily using drop rules instead of reject rules to prevent ICMP error generation
  • Implement network-level filtering to block packets with obviously malformed IP length fields
  • Audit VM network traffic for suspicious patterns while patches are being deployed

Patch Information

Red Hat has released security advisories addressing this vulnerability across multiple product versions. The patches add proper bounds checking to validate the IP header's declared length against the actual packet buffer size before copying data into ICMP error responses.

Consult the following advisories for patch information specific to your deployment:

  • RHSA-2026:11694
  • RHSA-2026:11695
  • RHSA-2026:11696
  • RHSA-2026:11698
  • RHSA-2026:11700
  • RHSA-2026:11701
  • RHSA-2026:11702

Additional technical details are available in Red Hat Bug Report #2453458 and the Red Hat CVE-2026-5265 Information page.

Workarounds

  • Temporarily convert reject ACL rules to drop rules to prevent ICMP error message generation until patches can be applied
  • Implement egress filtering on VMs to block packets with malformed IP length fields
  • Isolate untrusted VMs to separate OVN segments with limited connectivity
  • Consider rate-limiting ICMP error responses at the network layer to reduce potential data exfiltration bandwidth
bash
# Example: Convert reject ACL to drop rule (temporary workaround)
# Before (generates ICMP error - vulnerable):
# ovn-nbctl acl-add <switch> to-lport 1000 "inport == \"vm-port\" && ip4.dst == 10.0.0.1" reject

# After (silently drops packet - mitigates vulnerability):
ovn-nbctl acl-del <switch> to-lport 1000 "inport == \"vm-port\" && ip4.dst == 10.0.0.1"
ovn-nbctl acl-add <switch> to-lport 1000 "inport == \"vm-port\" && ip4.dst == 10.0.0.1" drop

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechOvn

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability0.09%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-130
  • Technical References
  • Red Hat Security Advisory RHSA-2026:11694

  • Red Hat Security Advisory RHSA-2026:11695

  • Red Hat Security Advisory RHSA-2026:11696

  • Red Hat Security Advisory RHSA-2026:11698

  • Red Hat Security Advisory RHSA-2026:11700

  • Red Hat Security Advisory RHSA-2026:11701

  • Red Hat Security Advisory RHSA-2026:11702

  • Red Hat CVE-2026-5265 Information

  • Red Hat Bug Report #2453458

  • OpenWall OSS-Security Discussion

  • OpenWall OSS-Security Discussion
  • Related CVEs
  • CVE-2026-5367: OVN Information Disclosure Vulnerability

  • CVE-2025-0650: Open Virtual Network ACL Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English