CVE-2026-33666: Zserio BitStreamReader Overflow Bypasses Bounds Check
The National Vulnerability Database has detailed CVE-2026-33666, a high-severity vulnerability (CVSS 7.5) in Zserio, a data serialization framework. Prior to version 2.18.1, the setBitPosition() bounds check in BitStreamReader.h’s readBytes() and readString() functions is bypassed due to an integer overflow. This allows the code to attempt reading up to 512 MB from a buffer that is only a few bytes long, leading to a segmentation fault.
This is a critical flaw that can lead to denial-of-service, disrupting applications reliant on Zserio for data serialization. The attacker’s calculus here is straightforward: exploit an easily triggered bug to crash services. While the CVSS vector indicates no impact on confidentiality or integrity, a reliable DoS can still be a significant operational hurdle, especially for critical infrastructure or high-availability systems.
Defenders need to treat this as an immediate patching priority. The fix is available in Zserio version 2.18.1. Any systems or applications leveraging Zserio must be updated to mitigate the risk of service disruption. This isn’t theoretical; integer overflows bypassing bounds checks are a classic vulnerability class that consistently gets exploited.
What This Means For You
- If your organization utilizes Zserio for data serialization in any application, you need to identify all instances and patch them to version 2.18.1 or later immediately. A segmentation fault from this vulnerability can lead to critical service outages. Prioritize systems where Zserio handles untrusted input.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-33666: Zserio BitStreamReader readBytes Overflow Attempt
title: CVE-2026-33666: Zserio BitStreamReader readBytes Overflow Attempt
id: scw-2026-04-24-ai-1
status: experimental
level: critical
description: |
Detects the execution of Zserio related processes attempting to call the vulnerable readBytes function in BitStreamReader.h, which is a direct indicator of an attempt to exploit CVE-2026-33666. The overflow in setBitPosition bypasses bounds checks, leading to a segmentation fault when reading an excessive amount of data from a small buffer.
author: SCW Feed Engine (AI-generated)
date: 2026-04-24
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-33666/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: process_creation
detection:
selection:
Image|contains:
- 'zserio'
CommandLine|contains:
- 'readBytes'
CommandLine|contains:
- 'setBitPosition'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-33666 | Buffer Overflow | Zserio framework versions prior to 2.18.1 |
| CVE-2026-33666 | Memory Corruption | Zserio BitStreamReader.h readBytes() function |
| CVE-2026-33666 | Memory Corruption | Zserio BitStreamReader.h readString() function |
| CVE-2026-33666 | DoS | Segmentation fault due to bypassed setBitPosition() bounds check in Zserio |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 24, 2026 at 22:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.