Kitty Terminal Heap Over-Read/Write Vulnerability (CVE-2026-33642) Critical Severity
The National Vulnerability Database has disclosed CVE-2026-33642, a critical vulnerability affecting Kitty, a cross-platform GPU-accelerated terminal emulator. Versions 0.46.2 and earlier contain a flaw in the handle_compose_command() function where unsigned 32-bit arithmetic for composition offsets is susceptible to integer wrapping. This can allow an attacker to bypass bounds checks and trigger heap buffer over-reads or writes within the compose_rectangles() function.
An attacker can exploit this vulnerability by simply sending crafted escape sequences to a Kitty terminal. This requires no user interaction and no non-default configurations. The National Vulnerability Database notes that an attacker merely needs the ability to produce output within a Kitty terminal window, making vectors like malicious files, SSH login banners, or piped content viable attack paths. The severity is rated CVSS 9.9 (CRITICAL).
This vulnerability has been patched in Kitty version 0.47.0. Defenders should prioritize updating all Kitty terminal instances to the latest version immediately. For systems where immediate patching is not feasible, strict input sanitization for any content displayed within Kitty terminals should be considered, though this is a difficult control to implement effectively against arbitrary escape sequence injection.
What This Means For You
- If your organization uses the Kitty terminal emulator, immediately update to version 0.47.0 or later. This vulnerability is remotely exploitable without user interaction, meaning any system running a vulnerable version that can display output is at risk.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-33642 - Kitty Terminal Heap Over-Read/Write via Crafted Escape Sequences
title: CVE-2026-33642 - Kitty Terminal Heap Over-Read/Write via Crafted Escape Sequences
id: scw-2026-05-19-ai-1
status: experimental
level: critical
description: |
Detects the execution of the Kitty terminal emulator with command line arguments that contain escape sequences commonly used to trigger graphical control operations. This rule specifically targets CVE-2026-33642 by looking for the Kitty executable and patterns indicative of escape sequences that could be used to craft the malicious offsets for the heap over-read/write vulnerability in handle_compose_command().
author: SCW Feed Engine (AI-generated)
date: 2026-05-19
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-33642/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: process_creation
detection:
selection:
Image|contains:
- 'kitty'
CommandLine|contains:
- '\x1b[<'
- '\x1b[>'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-33642 | Vulnerability | CVE-2026-33642 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 19, 2026 at 22:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.