Metrics
Affected Vendors & Products
Mon, 23 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Feb 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in Cesanta Mongoose up to 7.20. This affects the function getpeer of the file /src/net_builtin.c of the component TCP Sequence Number Handler. The manipulation leads to improper verification of source of a communication channel. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Cesanta Mongoose TCP Sequence Number net_builtin.c getpeer verification of source | |
| First Time appeared |
Cesanta
Cesanta mongoose |
|
| Weaknesses | CWE-940 | |
| CPEs | cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cesanta
Cesanta mongoose |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T13:32:57.830Z
Reserved: 2026-02-22T07:57:28.584Z
Link: CVE-2026-2967
Updated: 2026-02-23T13:32:51.789Z
Status : Analyzed
Published: 2026-02-23T04:16:02.040
Modified: 2026-02-23T20:17:44.177
Link: CVE-2026-2967
No data.