CVE-2026-37539

Cannelloni · v2

A buffer overflow vulnerability in Cannelloni v2 allows remote attackers to cause a denial of service or execute arbitrary code via crafted CAN FD frames.

Executive summary

A critical buffer overflow vulnerability in the Cannelloni v2 parser and decoder functions poses a severe risk of arbitrary code execution for affected systems.

Vulnerability

This is a buffer overflow vulnerability located in the parseCANFrame and decodeFrame functions. The vulnerability is exploitable by an unauthenticated remote attacker who can send crafted CAN FD frames to the target system.

Business impact

The successful exploitation of this vulnerability can lead to a complete system crash (Denial of Service) or the execution of unauthorized code with the privileges of the application. Given the CVSS score of 9.8, this represents a critical risk to operational continuity and system integrity, potentially allowing attackers to gain full control over the affected hardware or software environment.

Remediation

Immediate Action: Update the Cannelloni v2 software to the latest available version provided by the vendor.

Proactive Monitoring: Monitor system logs for anomalous CAN frame traffic or frequent application crashes that may indicate exploitation attempts.

Compensating Controls: Implement network segmentation to isolate CAN bus traffic from untrusted networks and utilize deep packet inspection to identify malformed frames.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

The severity of this vulnerability necessitates immediate attention. Organizations should prioritize patching the affected software components to prevent potential remote code execution. If immediate updates are not feasible, strict network access controls must be enforced to minimize the attack surface until a permanent fix is deployed.