PatchSiren cyber security CVE debrief
CVE-2026-8507 Unknown Vendor CVE debrief
CVE-2026-8507 affects the Perl module Crypt::OpenSSL::PKCS12 through version 1.94. A crafted PKCS12 file with a very large SAFEBAG attribute can trigger a heap out-of-bounds write during info() or info_as_hash() parsing, creating remote code execution potential.
- Vendor
- Unknown Vendor
- Product
- Unknown
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-17
- Original CVE updated
- 2026-05-18
- Advisory published
- 2026-05-17
- Advisory updated
- 2026-05-18
Who should care
Perl developers, application maintainers, and security teams that use Crypt::OpenSSL::PKCS12 to inspect or process PKCS12 files, especially when those files can come from untrusted sources.
Technical summary
The vulnerability is described as an out-of-bounds write in Crypt::OpenSSL::PKCS12 when parsing PKCS12 content. Specifically, a SAFEBAG containing a >= 1 GiB OCTET STRING or BIT STRING attribute can trigger a heap-OOB-WRITE through info() or info_as_hash(). The NVD record maps this to CWE-787, and the issue is described as having RCE potential.
Defensive priority
High for any environment that parses attacker-controlled or externally supplied PKCS12 files; otherwise patch at the next normal security maintenance window.
Recommended defensive actions
- Update Crypt::OpenSSL::PKCS12 to a release newer than 1.94; the source corpus includes the 1.95 change log as the follow-on release reference.
- Inventory applications and scripts that call info() or info_as_hash() on PKCS12 data.
- Treat PKCS12 files from untrusted or semi-trusted sources as high risk until patched.
- Add validation and size limits around PKCS12 ingestion where feasible, and reject anomalously large attributes before parsing.
- After upgrading, retest PKCS12-processing paths with representative input to confirm the module no longer accepts the vulnerable code path.
Evidence notes
The supplied NVD record for CVE-2026-8507 states that Crypt::OpenSSL::PKCS12 versions through 1.94 are affected and describes a heap-OOB-WRITE during PKCS12 parsing with RCE potential. The source corpus also includes upstream issue, patch, release-note, and OSS-security references that support the fix context. No CVSS score was provided in the supplied data.
Official resources
-
CVE-2026-8507 CVE record
CVE.org
-
CVE-2026-8507 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
9b29abf9-4ab0-4765-b253-1875cd9b441e
-
Source reference
9b29abf9-4ab0-4765-b253-1875cd9b441e
-
Source reference
9b29abf9-4ab0-4765-b253-1875cd9b441e
-
Source reference
9b29abf9-4ab0-4765-b253-1875cd9b441e
-
Source reference
af854a3a-2127-422b-91ae-364da2661108
Publicly disclosed on 2026-05-17, matching the supplied CVE and source publication timestamps.