PT-2026-28677 · Nsa · Ghidra
Todb
·
Published
2026-03-29
·
Updated
2026-03-29
·
CVE-2026-4946
CVSS v3.1
8.8
High
| AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Ghidra versions prior to 12.0.3
Description
The software improperly processes annotation directives embedded in automatically extracted binary data, leading to arbitrary command execution when a user interacts with the user interface. The
@execute annotation, designed for trusted, user-authored comments, is also parsed in comments generated during auto-analysis, such as CFStrings in Mach-O binaries. This allows a crafted binary to present clickable text that, when clicked, executes attacker-controlled commands on the analyst’s machine.Recommendations
Upgrade to a version prior to 12.0.3.
Fix
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Ghidra