Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.2
Golioth Pouch: Buffer Overflow in BLE Certificate Handling
CVE-2026-23750
Summary
A security flaw in Golioth Pouch 0.1.0 can cause the software to crash or become unstable when handling Bluetooth Low Energy (BLE) certificates. This vulnerability allows an unauthorized device to potentially access sensitive information. To protect against this issue, update to a version of Golioth Pouch that includes the fix, which is available starting from commit 1b2219a1.
Original title
Golioth Pouch version 0.1.0, prior to commit 1b2219a1, contains a heap-based buffer overflow in BLE GATT server certificate handling. server_cert_write() allocates a heap buffer of size CONFIG_POUC...
Original description
Golioth Pouch version 0.1.0, prior to commit 1b2219a1, contains a heap-based buffer overflow in BLE GATT server certificate handling. server_cert_write() allocates a heap buffer of size CONFIG_POUCH_SERVER_CERT_MAX_LEN when receiving the first fragment, then appends subsequent fragments using memcpy() without verifying that sufficient capacity remains. An adjacent BLE client can send unauthenticated fragments whose combined size exceeds the allocated buffer, causing a heap overflow and crash; integrity impact is also possible due to memory corruption.
nvd CVSS3.1
8.1
nvd CVSS4.0
7.2
Vulnerability type
CWE-122
Heap-based Buffer Overflow
Published: 26 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026