Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 30 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nsa
Nsa ghidra |
|
| Vendors & Products |
Nsa
Nsa ghidra |
Sun, 29 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This allows a crafted binary to present seemingly benign clickable text which, when clicked, executes attacker-controlled commands on the analyst’s machine. | |
| Title | NSA Ghidra Auto-Analysis Annotation Command Execution | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AHA
Published:
Updated: 2026-03-30T15:00:34.442Z
Reserved: 2026-03-27T02:17:29.992Z
Link: CVE-2026-4946
Updated: 2026-03-30T15:00:29.366Z
Status : Awaiting Analysis
Published: 2026-03-29T20:16:12.723
Modified: 2026-03-30T15:16:33.710
Link: CVE-2026-4946
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:58:01Z