Vulnerability Description
Incorrect packet validation allowed unbounded recursion parsing SCTP chunk parameters. This can eventually result in a stack overflow and panic. Remote attackers can craft packets which cause affected systems to panic. This affects any system where pf is configured to process traffic, independent of the configured ruleset.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 13.5 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2026-7164?
CVE-2026-7164 is a vulnerability with a CVSS score of 7.5 (HIGH). Incorrect packet validation allowed unbounded recursion parsing SCTP chunk parameters. This can eventually result in a stack overflow and panic. Remote attackers can craft packets which cause affect...
How severe is CVE-2026-7164?
CVE-2026-7164 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7164?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.