CVE-2026-8275
LOW
2,9
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
LOW
3,7
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: low
LOW
2,6
Source: [email protected]
Access Vector: network
Access Complexity: high
Authentication: none
Confidentiality: none
Integrity: none
Availability: partial
Description
AI Translation Available
A vulnerability was detected in bettercap up to 2.41.5. Affected by this vulnerability is the function ippReadChunkedBody of the file modules/zerogod/zerogod_ipp_primitives.go of the component zerogod IPP Service. Performing a manipulation results in integer coercion error. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is now public and may be used. The patch is named 3731d5576cffae9eefe3721cd46a40933304129f. To fix this issue, it is recommended to deploy a patch.
192
Integer Coercion Error
IncompleteCommon Consequences
Security Scopes Affected:
Availability
Integrity
Confidentiality
Other
Potential Impacts:
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Dos: Crash, Exit, Or Restart
Execute Unauthorized Code Or Commands
Other
Applicable Platforms
Languages:
C, C#, C++, Java
https://github.com/bettercap/bettercap/
https://github.com/bettercap/bettercap/commit/3731d5576cffae9eefe3721cd46a40933…
https://github.com/bettercap/bettercap/issues/1263
https://github.com/bettercap/bettercap/pull/1264
https://github.com/user-attachments/files/26852847/poc.py
https://vuldb.com/submit/811145
https://vuldb.com/vuln/362572
https://vuldb.com/vuln/362572/cti