CVE-2026-34971
highCVSS v3 Base Score
8.5
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Characteristics
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Confidentiality
High
Integrity
High
Availability
High
Vulnerability Report
Generated by CyberWatcher
Description
A flaw was found in Wasmtime, a runtime for WebAssembly. On aarch64 systems, a miscompilation bug in Wasmtime's Cranelift backend can be exploited by a guest WebAssembly module. This vulnerability allows the module to bypass memory bounds checks, enabling arbitrary read and write operations on the host system's memory. This ultimately leads to a sandbox escape, where the guest module can access resources beyond its intended isolated environment.
CWE
CWE-125Affected Products
Red Hat Connectivity Link 1Red Hat Enterprise Linux 10