MIT Kerberos 5 NULL ptr deref in gss_accept_sec_context before 1.22.3
CVE-2026-40355 Published on April 28, 2026
In MIT Kerberos 5 (aka krb5) before 1.22.3, there is a NULL pointer dereference if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, causing the process to terminate in parse_nego_message.
Vulnerability Analysis
CVE-2026-40355 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. Public availability of a proof of concept (POC) exploit exists for CVE-2026-40355. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
NULL Pointer Dereference
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.
Products Associated with CVE-2026-40355
Want to know whenever a new CVE is published for MIT Kerberos 5? stack.watch will email you.
Affected Versions
MIT Kerberos 5:- Version 1.18 and below 1.22.3 is affected.