CVE-2026-35092
β οΈ highSummary
A flaw was found in Corosync. An integer overflow vulnerability in Corosync's join message sanity validation allows a remote, unauthenticated attacker to send crafted User Datagram Protocol (UDP) packets. This can cause the service to crash, leading to a denial of service. This vulnerability specifically affects Corosync deployments configured to use totemudp/totemudpu mode.
CVSS Score
7.5
High
EPSS Score
1.0
Exploit Probability
Published Date
2026-04-01
First Seen: 2026-04-08
π Relative Risk Intelligence
This CVE is Moderate Risk - more severe than 69.1% of all 318,071 vulnerabilities in our database.
#98,337
Above average severity
Severity Percentile
π― CISA SSVC Assessment Updated: Apr 1, 2026
π Exploitation Status
None
No known exploits
βοΈ Automatable
YES
Can be exploited automatically
π₯ Technical Impact
Partial
Limited system impact
π Discovered By
Red Hat would like to thank SebastiΓ‘n Alba Vives for reporting this issue.
SSVC data provided by
CISA
Last Modified
2026-04-07
Source
NVD π
CVSS Vector 3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE IDs (Weakness Types)