FKIE_CVE-2026-25933
Vulnerability from fkie_nvd - Published: 2026-02-12 20:16 - Updated: 2026-02-19 21:30
Severity ?
Summary
Arduino App Lab is a cross-platform IDE for developing Arduino Apps. Prior to 0.4.0, a vulnerability was identified in the Terminal component of the arduino-app-lab application. The issue stems from insufficient sanitization and validation of input data received from connected hardware devices, specifically in the _info.Serial and _info.Address metadata fields. The problem occurs during device information handling. When a board is connected, the application collects identifying attributes to establish a terminal session. Because strict validation is not enforced for the Serial and Address parameters, an attacker with control over the connected hardware can supply specially crafted strings containing shell metacharacters. The exploitation requires direct physical access to a previously tampered board. When the host system processes these fields, any injected payload is executed with the privileges of the user running arduino-app-lab. This vulnerability is fixed in 0.4.0.
References
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/arduino/arduino-app-lab/releases/tag/al-0.4.0 | Product, Release Notes | |
| security-advisories@github.com | https://github.com/arduino/arduino-app-lab/security/advisories/GHSA-3652-939f-f7g4 | Patch, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:arduino:app_lab:*:*:*:*:*:*:*:*",
"matchCriteriaId": "244EB8A1-C8D1-40CA-A05C-ADA31BBD1252",
"versionEndExcluding": "0.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Arduino App Lab is a cross-platform IDE for developing Arduino Apps. Prior to 0.4.0, a vulnerability was identified in the Terminal component of the arduino-app-lab application. The issue stems from insufficient sanitization and validation of input data received from connected hardware devices, specifically in the _info.Serial and _info.Address metadata fields. The problem occurs during device information handling. When a board is connected, the application collects identifying attributes to establish a terminal session. Because strict validation is not enforced for the Serial and Address parameters, an attacker with control over the connected hardware can supply specially crafted strings containing shell metacharacters. The exploitation requires direct physical access to a previously tampered board. When the host system processes these fields, any injected payload is executed with the privileges of the user running arduino-app-lab. This vulnerability is fixed in 0.4.0."
},
{
"lang": "es",
"value": "Arduino App Lab es un IDE multiplataforma para desarrollar aplicaciones de Arduino. Antes de la versi\u00f3n 0.4.0, se identific\u00f3 una vulnerabilidad en el componente Terminal de la aplicaci\u00f3n arduino-app-lab. El problema se origina por la sanitizaci\u00f3n y validaci\u00f3n insuficientes de los datos de entrada recibidos de los dispositivos de hardware conectados, espec\u00edficamente en los campos de metadatos _info.Serial y _info.Address. El problema ocurre durante el manejo de la informaci\u00f3n del dispositivo. Cuando se conecta una placa, la aplicaci\u00f3n recopila atributos de identificaci\u00f3n para establecer una sesi\u00f3n de terminal. Debido a que no se aplica una validaci\u00f3n estricta para los par\u00e1metros Serial y Address, un atacante con control sobre el hardware conectado puede proporcionar cadenas especialmente dise\u00f1adas que contengan metacaracteres de shell. La explotaci\u00f3n requiere acceso f\u00edsico directo a una placa previamente manipulada. Cuando el sistema anfitri\u00f3n procesa estos campos, cualquier carga \u00fatil inyectada se ejecuta con los privilegios del usuario que ejecuta arduino-app-lab. Esta vulnerabilidad se corrigi\u00f3 en la versi\u00f3n 0.4.0."
}
],
"id": "CVE-2026-25933",
"lastModified": "2026-02-19T21:30:53.170",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.2,
"impactScore": 6.0,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-02-12T20:16:11.067",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Product",
"Release Notes"
],
"url": "https://github.com/arduino/arduino-app-lab/releases/tag/al-0.4.0"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://github.com/arduino/arduino-app-lab/security/advisories/GHSA-3652-939f-f7g4"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…