PT-2026-42731 · Zephyr · Zephyr

Published

2026-05-22

·

Updated

2026-05-22

·

CVE-2026-5072

CVSS v3.1

6.5

Medium

VectorAV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Name of the Vulnerable Software and Affected Versions Zephyr (affected versions not specified)
Description A bitwise shift issue in the PTP subsystem allows a remote attacker to cause undefined behavior and potential system crashes. By sending a crafted 'PTP MSG MANAGEMENT' message, an attacker can set an unvalidated negative log announce interval value in the port's data set. When a 'PTP MSG ANNOUNCE' message is subsequently processed, the port timer set timeout random() function computes a timeout using the operation NSEC PER SEC >> -log seconds. If the provided value is sufficiently negative, the shift amount exceeds the 64-bit integer width, triggering undefined behavior in C. This may result in a system crash via a compiler-generated illegal instruction trap on certain architectures, or produce an erroneous zero timeout leading to resource starvation loops or other logical errors.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Related Identifiers

CVE-2026-5072

Affected Products

Zephyr