CVE-2026-9054
Received
Published: 22 May 2026, 03:21
Last modified:22 May 2026, 16:12
Vulnerability Summary
Overall Risk (default)
high
70/100 CVSS Score
9.2 CRITICAL
v4.0 (cve.org)
EPSS Score
0.04% LOW
0% probability
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
22 May 2026, 03:21
Published
Vulnerability first disclosed
22 May 2026, 16:12
Last Modified
Vulnerability information updated
Description
An attacker sending tcp, il, rudp, rudp, or gre packets with a length less than the header size would trigger a kernel panic.
CVSS Metrics
- v4.0•CRITICAL•Score: 9.2CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:A/AU:Y/R:A
- v4.0•CRITICAL•Score: 9.2CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:A/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:X/RE:X/U:X
EPSS Trends
Current EPSS score: 0.04%• Percentile: 12%
Techniques & Countermeasures
- CWE-130•Improper Handling of Length Parameter Inconsistency
The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.
Affected Systems
- 9front•9front
≥ Plan 9 4e, < 70c97c334171c715df82774d1a47638abaca2db4