CVE-2026-44054

Published: Mag 21, 2026 Last Modified: Mag 21, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,5
Source: 33c584b5-0579-4c06-b2a0-8d8329fcab9c
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high

Description

AI Translation Available

Netatalk 2.0.0 through 4.4.2 generates AFP session tokens derived from predictable process IDs, which allows a remote authenticated attacker to cause a denial of service by exploiting the reconnect mechanism.

330

Use of Insufficiently Random Values

Stable
Common Consequences
Security Scopes Affected:
Confidentiality Other Access Control
Potential Impacts:
Other Bypass Protection Mechanism Gain Privileges Or Assume Identity
Applicable Platforms
All platforms may be affected
View CWE Details
https://netatalk.io/security/CVE-2026-44054