CVE-2026-37537:
An integer underflow vulnerability in collin80/Open-SAE-J1939 (through commit 744024d) allows adjacent network attackers to perform an out-of-bounds write via a crafted CAN frame with a sequence number of zero in the Transport Protocol Data Transfer handler.
Score
A numerical rating that indicates how dangerous this vulnerability is.
8.1High- Published Date:May 1, 2026
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:0.0
- EPSS Percentile:3%
Exploitability
- Score:2.8
- Attack Vector:ADJACENT_NETWORK
- Attack Complexity:LOW
- Privileges Required:NONE
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.2
- Confidentiality Impact:NONE
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
An integer underflow vulnerability in collin80/Open-SAE-J1939 (through commit 744024d) allows adjacent network attackers to perform an out-of-bounds write via a crafted CAN frame with a sequence number of zero in the Transport Protocol Data Transfer handler.
Overview
CVE-2026-37537 affects collin80/Open-SAE-J1939 through commit 744024d4306bc387857dfce439558336806acb06 (dated 2023-03-08). The vulnerability is an integer underflow (CWE-190) in the Transport Protocol Data Transfer handler. When a CAN frame carrying a sequence number of 0 is received, an unsigned 8-bit index variable underflows to 255 instead of being validated, resulting in a write that exceeds the 1785-byte `MAX_TP_DT` buffer by 6 bytes at offset 1791. This memory corruption is reachable from the adjacent CAN network without privileges or user interaction. The CVSS v3.1 base score is 8.1 (HIGH), reflecting high impacts to both integrity and availability with no confidentiality impact.
Remediation
- There is no vendor-issued patch documented at the time of publication. Affected users should apply the following mitigations. First, add an explicit bounds check before computing the index — reject any CAN frame where `data[0]` equals 0 or exceeds the maximum expected sequence number for a TP.DT session. Second, change the index type or add a runtime assertion to prevent silent unsigned wraparound. Third, where possible, restrict physical or logical access to the CAN bus to trusted nodes only, reducing the attack surface described by the adjacent-network attack vector. Users should monitor the upstream repositories for patches and apply them as soon as they become available.
References
- - [CVE-2026-37537 – NVD Entry](https://nvd.nist.gov/vuln/detail/CVE-2026-37537)
- - [Proof-of-Concept / Vulnerability Details Gist (sgInnora)](https://gist.github.com/sgInnora/f4ac66faeefe07a653ceeb3f58cdc381)
- - [collin80/Open-SAE-J1939 – Affected Fork (GitHub)](https://github.com/collin80/Open-SAE-J1939)
- - [DanielMartensson/Open-SAE-J1939 – Upstream Repository (GitHub)](https://github.com/DanielMartensson/Open-SAE-J1939)
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.