Vanetza V2X Vulnerability: CVE-2026-37554 Allows Remote DoS

Vanetza V2X Vulnerability: CVE-2026-37554 Allows Remote DoS

The National Vulnerability Database has identified CVE-2026-37554, a critical denial-of-service vulnerability affecting Vanetza V2X software, specifically version v26.02. Attackers can remotely trigger this flaw by sending specially crafted GeoNetworking packets. The vulnerability stems from improper exception handling within the GeoNetworking packet processing pipeline. OpenSSL exceptions related to Elliptic Curve Cryptography (ECC) point validation are not caught, leading to an unhandled std::terminate and crashing the V2X receiver. This disruption can cripple vehicle-to-everything communication systems.

This flaw carries a CVSS score of 7.5 (HIGH) and is exploitable over the network with no authentication or user interaction required. The National Vulnerability Database notes that affected products were not explicitly specified, but the nature of V2X systems means any deployment running this version is potentially at risk. Defenders must prioritize patching or mitigating this vulnerability to prevent attackers from disrupting critical transportation infrastructure and communications.

What This Means For You

  • If your organization utilizes Vanetza V2X software, specifically version v26.02, you must immediately investigate and apply any available patches from the vendor. This vulnerability allows for remote, unauthenticated denial-of-service attacks, which could severely impact V2X communication networks and potentially disrupt transportation safety systems.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1499 Impact

Vanetza V2X GeoNetworking Packet DoS Attempt — CVE-2026-37554

Sigma YAML — free preview
title: Vanetza V2X GeoNetworking Packet DoS Attempt — CVE-2026-37554
id: scw-2026-05-01-ai-1
status: experimental
level: high
description: |
  Detects attempts to exploit CVE-2026-37554 in Vanetza V2X by sending specially crafted GeoNetworking packets that trigger an unhandled exception during ECC point validation, leading to a denial of service. This rule looks for specific URI patterns indicative of GeoNetworking packet processing and a 500 Internal Server Error, suggesting a crash due to the unhandled exception.
author: SCW Feed Engine (AI-generated)
date: 2026-05-01
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-37554/
tags:
  - attack.impact
  - attack.t1499
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/GeoNetworking/packet'
      cs-uri-query|contains:
          - 'ECC_point_validation_failed'
      sc-status:
          - 500
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-37554 DoS Vanetza V2X v26.02
CVE-2026-37554 DoS GeoNetworking packet processing pipeline
CVE-2026-37554 DoS Router::indicate() call chain
CVE-2026-37554 DoS openssl_wrapper.cpp check() function (line 19)
CVE-2026-37554 DoS parse_secured() exception handling
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 01, 2026 at 19:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-7586 — Denial of Service

CVE-2026-7586 — A weakness has been identified in Open5GS up to 2.7.7. Affected is the function ogs_id_get_value of the file /src/amf/nudm-handler.c of the component AMF....

vulnerabilityCVEmedium-severitydenial-of-servicecwe-404
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs

CVE-2026-7585 — Denial of Service

CVE-2026-7585 — A vulnerability was determined in Open5GS up to 2.7.7. The impacted element is the function amf_nudm_sdm_handle_provisioned of the file /src/amf/nudm-handler.c of the component...

vulnerabilityCVEmedium-severitydenial-of-servicecwe-404
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-37552: MixPHP Framework Unsafe Deserialization Exposes Servers to RCE

CVE-2026-37552 — Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke TCP server (Server.php:87) receives data from a TCP socket, passes it directly...

vulnerabilityCVEhigh-severitycode-execution
/SCW Vulnerability Desk /HIGH /8.4 /⚑ 3 IOCs