Vulnerability Description
A stack-based buffer overflow in mangle_to_hex_lower() and mangle_to_hex_upper() in src/rp_cpu.c in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted rule file, or via the -j or -k rule options used with password candidates of 128 or more characters. The vulnerability is caused by a bounds check that fails to account for the 2x expansion that occurs when password bytes are converted to hexadecimal.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hashcat | Hashcat | 7.1.2 |
Related Weaknesses (CWE)
References
- https://gist.github.com/sgInnora/107f2eb20367e47d58c911e38d56a91fExploitMitigationThird Party Advisory
FAQ
What is CVE-2026-42482?
CVE-2026-42482 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A stack-based buffer overflow in mangle_to_hex_lower() and mangle_to_hex_upper() in src/rp_cpu.c in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code vi...
How severe is CVE-2026-42482?
CVE-2026-42482 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-42482?
Check the references section above for vendor advisories and patch information. Affected products include: Hashcat Hashcat.