PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-44060 Netatalk CVE debrief

CVE-2026-44060 is a high-severity denial-of-service issue in Netatalk. A crafted DSI write request can trigger an integer underflow in dsi_writeinit(), allowing a remote unauthenticated attacker to disrupt service. The published CVSS vector reflects a network-reachable, no-authentication attack with availability impact only.

Vendor
Netatalk
Product
Unknown
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-21
Original CVE updated
2026-05-21
Advisory published
2026-05-21
Advisory updated
2026-05-21

Who should care

Administrators and operators running Netatalk services, especially exposed AFP/DSI-facing deployments. Security teams for Linux/Unix file-sharing environments, distro maintainers, and incident responders should also prioritize review because the issue is remotely reachable and requires no authentication.

Technical summary

The vulnerability is described as an integer underflow in dsi_writeinit() affecting Netatalk 1.5.0 through 4.4.2. According to the supplied CVE record and NVD metadata, a remote attacker can send a crafted DSI write request that may cause a denial of service. The mapped weakness is CWE-191 (Integer Underflow). The CVSS 3.1 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H.

Defensive priority

High. The issue is remotely exploitable without authentication and can take down the service, so exposed Netatalk deployments should be reviewed and remediated promptly.

Recommended defensive actions

  • Check whether any Netatalk instance in your environment is running a version in the affected range (1.5.0 through 4.4.2).
  • Apply the vendor-provided fix or upgrade to a non-affected Netatalk release as soon as it is available.
  • Restrict network exposure to Netatalk services until remediation is complete, especially on untrusted networks.
  • Monitor for abnormal crashes, restarts, or service interruptions tied to DSI write handling.
  • Track downstream distribution advisories if Netatalk is packaged by your OS or appliance vendor.

Evidence notes

This debrief is based on the supplied CVE description, NVD metadata, and the referenced Netatalk security advisory. The record maps the issue to CWE-191 and reports CVSS 3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. No CISA KEV entry was provided in the source corpus.

Official resources

The CVE was published on 2026-05-21 at 08:16:21.577Z and modified the same day at 09:16:28.243Z. Based on the supplied sources, the issue was publicly disclosed on 2026-05-21 via the CVE/NVD record and the Netatalk security advisory.