PatchSiren cyber security CVE debrief
CVE-2026-47784 memcached CVE debrief
CVE-2026-47784 is a timing side-channel issue in memcached’s SASL password database authentication path. The flaw exists in versions before 1.6.42, where sasl_server_userdb_checkpass uses memcmp in a way that can leak information through response timing. The record was published by NVD/MITRE on 2026-05-20 and was still marked "Undergoing Analysis" in the source snapshot. NVD rates the issue HIGH (CVSS 8.1).
- Vendor
- memcached
- Product
- Unknown
- CVSS
- HIGH 8.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-20
- Original CVE updated
- 2026-05-21
- Advisory published
- 2026-05-20
- Advisory updated
- 2026-05-21
Who should care
Operators running memcached with SASL password database authentication enabled, especially internet-facing deployments; security teams responsible for service hardening; and package or platform maintainers who distribute memcached.
Technical summary
The vulnerability is classified as CWE-208 (Observable Timing Discrepancy). In memcached before 1.6.42, sasl_server_userdb_checkpass relies on memcmp when checking SASL password database credentials. Because memcmp can stop comparing at the first mismatch, an attacker may be able to infer password data from timing differences. The linked memcached 1.6.42 release materials and commit indicate the issue was addressed in that release line.
Defensive priority
High. This affects authentication handling and may expose secret material through timing behavior, so remediation should be prioritized for any deployment using SASL password database authentication.
Recommended defensive actions
- Upgrade memcached to 1.6.42 or later.
- If immediate upgrading is not possible, reduce exposure of the SASL-authenticated service to untrusted networks.
- Confirm whether SASL password database authentication is enabled in each deployment and disable it where it is not required.
- Review the linked memcached commit and 1.6.42 release notes to verify the fix is present in your packaged build.
- Reassess configurations and access controls for any externally reachable memcached instance using SASL authentication.
Evidence notes
Source data ties the issue to memcached before 1.6.42 and identifies the root cause as memcmp usage in sasl_server_userdb_checkpass. The NVD record lists CWE-208 and a CVSS vector of CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. The NVD snapshot in the supplied corpus was published on 2026-05-20 and marked "Undergoing Analysis" at the time of retrieval.
Official resources
-
CVE-2026-47784 CVE record
CVE.org
-
CVE-2026-47784 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Patch
-
Mitigation or vendor reference
[email protected] - Release Notes
-
Mitigation or vendor reference
[email protected] - Release Notes
Publicly disclosed in the CVE/NVD record on 2026-05-20.