Vulnerability Description
An operator precedence bug in the kernel results in a scenario where a buffer overflow causes attacker-controlled data to overwrite adjacent execve(2) argument buffers. The bug may be exploitable by an unprivileged user to obtain superuser privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 13.5 |
Related Weaknesses (CWE)
References
- https://security.freebsd.org/advisories/FreeBSD-SA-26:13.exec.ascVendor Advisory
- https://blog.calif.io/p/cve-2026-7270-how-i-get-root-on-freebsd
- https://news.ycombinator.com/item?id=48077971
FAQ
What is CVE-2026-7270?
CVE-2026-7270 is a vulnerability with a CVSS score of 7.8 (HIGH). An operator precedence bug in the kernel results in a scenario where a buffer overflow causes attacker-controlled data to overwrite adjacent execve(2) argument buffers. The bug may be exploitable by ...
How severe is CVE-2026-7270?
CVE-2026-7270 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7270?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.