CVE-2026-3407

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to potentially crash the Yosys software or execute malicious code by exploiting a flaw in how it handles certain data, specifically through a buffer overflow. The attack can only be carried out on the local machine where Yosys is running, and while it has been publicly disclosed, it doesn't always occur reliably.

Technical Description

A vulnerability was determined in YosysHQ yosys up to 0.62. This affects the function Yosys::RTLIL::Const::set of the file kernel/rtlil.h of the component BLIF File Parser. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Applying a patch is the recommended action to fix this issue. It appears that the issue is not reproducible all the time.

CVSS Vector Analysis

Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$638($500-$1K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Mar 2, 2026

about 1 month ago

Last Modified

Mar 2, 2026

about 1 month ago