Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 30 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nsa
Nsa ghidra |
|
| Vendors & Products |
Nsa
Nsa ghidra |
Sun, 29 Mar 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This allows a crafted binary to present seemingly benign clickable text which, when clicked, executes attacker-controlled commands on the analyst’s machine. | |
| Title | NSA Ghidra Auto-Analysis Annotation Command Execution | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AHA
Published:
Updated: 2026-03-30T15:00:34.442Z
Reserved: 2026-03-27T02:17:29.992Z
Link: CVE-2026-4946
Updated: 2026-03-30T15:00:29.366Z
Status : Awaiting Analysis
Published: 2026-03-29T20:16:12.723
Modified: 2026-03-30T15:16:33.710
Link: CVE-2026-4946
No data.
OpenCVE Enrichment
Updated: 2026-03-30T06:58:01Z