Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/openthread/openthread/pull/12818 |
|
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
The Openthread Authors
The Openthread Authors openthread |
|
| Vendors & Products |
The Openthread Authors
The Openthread Authors openthread |
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Input Validation in the NAT64 translator in The OpenThread Authors OpenThread before commit 26a882d on all platforms allows an attacker on the adjacent IPv4 network to inject corrupted IPv6 packets into the Thread mesh or bypass security checks via crafted IPv4 packets with options. | |
| Title | Improper Input Validation in OpenThread NAT64 Translator | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2026-05-13T14:46:46.709Z
Reserved: 2026-05-11T21:44:33.335Z
Link: CVE-2026-8369
Updated: 2026-05-13T14:46:38.216Z
Status : Awaiting Analysis
Published: 2026-05-13T14:18:16.953
Modified: 2026-05-13T15:54:22.820
Link: CVE-2026-8369
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:34:31Z