Out-of-bounds Read Affecting bacnet package, versions [1.4.0,1.4.3)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.25% (48th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Out-of-bounds Read vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-BACNET-16351827
  • published3 May 2026
  • disclosed24 Apr 2026
  • creditrasird-del

Introduced: 24 Apr 2026

NewCVE-2026-41503  (opens in a new tab)
CWE-125  (opens in a new tab)

How to fix?

Upgrade bacnet to version 1.4.3 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-bounds Read via the rpm_decode_object_property process. An attacker can cause the application to read memory past allocated buffer boundaries and potentially crash the system by sending a crafted BACnet/IP packet with a truncated property list containing an extended tag marker. This is only exploitable if the ReadPropertyMultiple confirmed service handler is enabled.

CVSS Base Scores

version 4.0
version 3.1