ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. Patches Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.
History

Fri, 13 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Undici
Undici undici
Vendors & Products Undici
Undici undici

Fri, 13 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Thu, 12 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Description ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process. Patches Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.
Title undici is vulnerable to Malicious WebSocket 64-bit length overflows undici parser and crashes the client
Weaknesses CWE-1284
CWE-248
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: openjs

Published: 2026-03-12T20:21:57.775Z

Updated: 2026-03-13T13:04:57.048Z

Reserved: 2026-01-28T12:05:10.024Z

Link: CVE-2026-1528

cve-icon Vulnrichment

Updated: 2026-03-13T13:04:19.272Z

cve-icon NVD

Status : Received

Published: 2026-03-12T21:16:25.330

Modified: 2026-03-12T21:16:25.330

Link: CVE-2026-1528

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-12T20:21:57Z

Links: CVE-2026-1528 - Bugzilla