PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-8507 Unknown Vendor CVE debrief

CVE-2026-8507 affects the Perl module Crypt::OpenSSL::PKCS12 through version 1.94. A crafted PKCS12 file with a very large SAFEBAG attribute can trigger a heap out-of-bounds write during info() or info_as_hash() parsing, creating remote code execution potential.

Vendor
Unknown Vendor
Product
Unknown
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-17
Original CVE updated
2026-05-18
Advisory published
2026-05-17
Advisory updated
2026-05-18

Who should care

Perl developers, application maintainers, and security teams that use Crypt::OpenSSL::PKCS12 to inspect or process PKCS12 files, especially when those files can come from untrusted sources.

Technical summary

The vulnerability is described as an out-of-bounds write in Crypt::OpenSSL::PKCS12 when parsing PKCS12 content. Specifically, a SAFEBAG containing a >= 1 GiB OCTET STRING or BIT STRING attribute can trigger a heap-OOB-WRITE through info() or info_as_hash(). The NVD record maps this to CWE-787, and the issue is described as having RCE potential.

Defensive priority

High for any environment that parses attacker-controlled or externally supplied PKCS12 files; otherwise patch at the next normal security maintenance window.

Recommended defensive actions

  • Update Crypt::OpenSSL::PKCS12 to a release newer than 1.94; the source corpus includes the 1.95 change log as the follow-on release reference.
  • Inventory applications and scripts that call info() or info_as_hash() on PKCS12 data.
  • Treat PKCS12 files from untrusted or semi-trusted sources as high risk until patched.
  • Add validation and size limits around PKCS12 ingestion where feasible, and reject anomalously large attributes before parsing.
  • After upgrading, retest PKCS12-processing paths with representative input to confirm the module no longer accepts the vulnerable code path.

Evidence notes

The supplied NVD record for CVE-2026-8507 states that Crypt::OpenSSL::PKCS12 versions through 1.94 are affected and describes a heap-OOB-WRITE during PKCS12 parsing with RCE potential. The source corpus also includes upstream issue, patch, release-note, and OSS-security references that support the fix context. No CVSS score was provided in the supplied data.

Official resources

Publicly disclosed on 2026-05-17, matching the supplied CVE and source publication timestamps.