Embedded System Vulnerabilities
A focused list of vulnerabilities relevant to embedded and IoT devices.
| CVE ID | Description | Severity | Published | Type |
|---|---|---|---|---|
| CVE-2026-39835 | SSH servers which use CertChecker as a public key callback without setting IsUserAuthority or IsHostAuthority could be … | Unknown | 2026-05-22 | Environment Specific |
| CVE-2026-39834 | When writing data larger than 4GB in a single Write call on an SSH channel, an integer overflow in the internal payload… | Unknown | 2026-05-22 | Environment Specific |
| CVE-2026-39833 | The in-memory keyring returned by NewKeyring() silently accepted keys with the ConfirmBeforeUse constraint but never en… | Unknown | 2026-05-22 | Environment Specific |
| CVE-2026-39831 | The Verify() method for FIDO/U2F security key types (sk-ecdsa-sha2-nistp256@openssh.com, sk-ssh-ed25519@openssh.com) di… | Unknown | 2026-05-22 | Environment Specific |
| CVE-2026-39830 | A malicious SSH peer could send unsolicited global request responses to fill an internal buffer, blocking the connectio… | Unknown | 2026-05-22 | Environment Specific |