PT-2026-35077 · Unknown · Bacnet Stack
Published
2026-04-24
·
Updated
2026-04-25
·
CVE-2026-41502
CVSS v4.0
8.7
High
| AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
BACnet Stack versions prior to 1.4.3
Description
An off-by-one out-of-bounds read exists in the ReadPropertyMultiple service decoder. Unauthenticated remote attackers can read one byte past an allocated buffer boundary by sending a crafted RPM request with a truncated object identifier. The issue occurs in the
rpm decode object id() function, which validates that apdu len is less than 5 but subsequently accesses six byte positions (indices 0-5). A 5-byte input satisfies the length check but results in a 1-byte out-of-bounds read, which can cause crashes on embedded devices. This flaw is located in src/bacnet/rpm.c and affects deployments where the ReadPropertyMultiple confirmed service handler is enabled.Recommendations
Update to version 1.4.3.
As a temporary workaround, disable the ReadPropertyMultiple confirmed service handler.
Exploit
Fix
Out of bounds Read
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Bacnet Stack