Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://github.com/openthread/openthread/pull/12818 |
|
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Input Validation in the NAT64 translator in The OpenThread Authors OpenThread before commit 26a882d on all platforms allows an attacker on the adjacent IPv4 network to inject corrupted IPv6 packets into the Thread mesh or bypass security checks via crafted IPv4 packets with options. | |
| Title | Improper Input Validation in OpenThread NAT64 Translator | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2026-05-13T14:46:46.709Z
Reserved: 2026-05-11T21:44:33.335Z
Link: CVE-2026-8369
Updated: 2026-05-13T14:46:38.216Z
Status : Awaiting Analysis
Published: 2026-05-13T14:18:16.953
Modified: 2026-05-13T15:54:22.820
Link: CVE-2026-8369
No data.
OpenCVE Enrichment
No data.