PgBouncer Integer Overflow (CVE-2026-6664) Leads to Remote Crash
A critical integer overflow vulnerability, tracked as CVE-2026-6664, has been identified in PgBouncer versions prior to 1.25.2. According to the National Vulnerability Database, this flaw resides in the network packet parsing code, specifically when handling SCRAM authentication packets.
This vulnerability allows an unauthenticated remote attacker to bypass boundary checks by sending a specially crafted, malformed SCRAM authentication packet. The direct consequence is a denial-of-service condition, where the PgBouncer instance crashes. The National Vulnerability Database has assigned this a CVSS score of 7.5 (HIGH), highlighting the ease of exploitation and significant impact on availability.
For defenders, this is a straightforward, high-impact issue. An attacker doesn’t need credentials or prior access to take your PgBouncer instance offline. This translates directly to database unavailability and potential cascading application failures. The attacker’s calculus is simple: send a malformed packet, cause a crash, and disrupt services with minimal effort.
What This Means For You
- If your organization uses PgBouncer, you need to immediately verify your deployed version. This isn't a theoretical threat; it's an unauthenticated remote crash. Patching PgBouncer to version 1.25.2 or later is the only way to mitigate CVE-2026-6664. Failing to do so leaves your critical database proxy wide open to trivial denial-of-service attacks.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-6664 PgBouncer SCRAM Auth Packet Crash - Free Tier
title: CVE-2026-6664 PgBouncer SCRAM Auth Packet Crash - Free Tier
id: scw-2026-05-09-ai-1
status: experimental
level: critical
description: |
Detects potential exploitation of CVE-2026-6664 by identifying unauthenticated remote attackers sending malformed SCRAM authentication packets to PgBouncer on its default port (6432), leading to a crash (indicated by a 500 status code in web server logs, often used to proxy PgBouncer). This rule is designed for the free tier as it directly targets the initial access vector of the vulnerability.
author: SCW Feed Engine (AI-generated)
date: 2026-05-09
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-6664/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: authentication
detection:
selection:
src_ip:
- '0.0.0.0/0'
dst_port:
- '6432'
cs-uri-query|contains:
- 'SCRAM'
sc-status:
- '500'
EventType:
- 'http'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6664 | DoS | PgBouncer before 1.25.2 |
| CVE-2026-6664 | Buffer Overflow | Integer overflow in network packet parsing code |
| CVE-2026-6664 | DoS | Malformed SCRAM authentication packet |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 09, 2026 at 04:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.