Ad

CVE-2026-32314

HIGH CVSS 4.0: 8.7 EPSS 0.08%
Updated Mar 19, 2026
Protocol
Parameter Value
CVSS 8.7 (HIGH)
Affected Versions before 0.13.10
Fixed In 0.13.10
Type CWE-248 (Uncaught Exception)
Vendor Protocol
Public PoC No

Yamux is a stream multiplexer over reliable, ordered connections such as TCP/IP. Prior to 0.13.10, the Rust implementation of Yamux can panic when processing a crafted inbound Data frame that sets SYN and uses a body length greater than DEFAULT_CREDIT (e.g. 262145). On the first packet of a new inbound stream, stream state is created and a receiver is queued before oversized-body validation completes.

When validation fails, the temporary stream is dropped and cleanup may call remove(...).expect("stream not found"), triggering a panic in the connection state machine. This is remotely reachable over a normal Yamux session and does not require authentication. This vulnerability is fixed in 0.13.10.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
None
No data modification
Availability
High
Complete denial of service

CVSS Vector v4.0

Weakness Type (CWE)

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Protocol Yamux
cpe:2.3:a:protocol:yamux:*:*:*:*:*:rust:*:*
0.13.10