Improper Input Validation in the NAT64 translator in The OpenThread Authors OpenThread before commit 26a882d on all platforms allows an attacker on the adjacent IPv4 network to inject corrupted IPv6 packets into the Thread mesh or bypass security checks via crafted IPv4 packets with options.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/openthread/openthread/pull/12818 |
|
History
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Input Validation in the NAT64 translator in The OpenThread Authors OpenThread before commit 26a882d on all platforms allows an attacker on the adjacent IPv4 network to inject corrupted IPv6 packets into the Thread mesh or bypass security checks via crafted IPv4 packets with options. | |
| Title | Improper Input Validation in OpenThread NAT64 Translator | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2026-05-13T14:46:46.709Z
Reserved: 2026-05-11T21:44:33.335Z
Link: CVE-2026-8369
Updated: 2026-05-13T14:46:38.216Z
Status : Awaiting Analysis
Published: 2026-05-13T14:18:16.953
Modified: 2026-05-13T15:54:22.820
Link: CVE-2026-8369
No data.
OpenCVE Enrichment
Updated: 2026-05-13T16:00:17Z