Bug 2441855 (CVE-2026-2966) - CVE-2026-2966 Mongoose: Mongoose: Information disclosure due to insufficiently random values in DNS transaction ID handling
Summary: CVE-2026-2966 Mongoose: Mongoose: Information disclosure due to insufficientl...
Keywords:
Status: NEW
Alias: CVE-2026-2966
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2441887 2441888 2441889 2441890 2441891 2441892 2441893
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-02-23 03:01 UTC by OSIDB Bzimport
Modified: 2026-02-23 07:56 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-02-23 03:01:34 UTC
A weakness has been identified in Cesanta Mongoose up to 7.20. The impacted element is the function mg_sendnsreq of the file /src/dns.c of the component DNS Transaction ID Handler. Executing a manipulation of the argument random can lead to insufficiently random values. The attack can be launched remotely. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.


Note You need to log in before you can comment on or make changes to this bug.