CVE-2026-1528

7.5 HIGH

📋 TL;DR

This vulnerability allows a malicious server to send specially crafted WebSocket frames with extremely large length values, causing undici's ByteParser to overflow and crash the Node.js process with a fatal TypeError. It affects any application using vulnerable versions of the undici HTTP client library for Node.js.

💻 Affected Systems

Products:
  • undici
Versions: All versions before v6.24.0 and v7.24.0
Operating Systems: All platforms running Node.js
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects applications using undici's WebSocket functionality. Applications must be connecting to WebSocket servers.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service - the Node.js process terminates, disrupting all services running on that process.

🟠

Likely Case

Service disruption through process termination when connecting to malicious or compromised servers.

🟢

If Mitigated

No impact if patched or if applications don't connect to untrusted servers.

🌐 Internet-Facing: HIGH - Applications connecting to external WebSocket servers are vulnerable to DoS attacks.
🏢 Internal Only: MEDIUM - Internal services could be affected if connecting to compromised internal servers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires control of the server the client connects to, or ability to intercept/modify WebSocket traffic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v6.24.0 or v7.24.0

Vendor Advisory: https://github.com/nodejs/undici/security/advisories/GHSA-f269-vfmq-vjvj

Restart Required: Yes

Instructions:

1. Check current undici version: npm list undici. 2. Update package.json to require undici >=6.24.0 (for v6) or >=7.24.0 (for v7). 3. Run npm update undici. 4. Restart all Node.js applications.

🔧 Temporary Workarounds

Restrict WebSocket connections

all

Only allow WebSocket connections to trusted, known servers

Use process monitoring with auto-restart

linux

Implement process monitoring that automatically restarts crashed Node.js processes

pm2 start app.js --watch
systemctl enable node-app

🧯 If You Can't Patch

  • Implement network segmentation to restrict which servers applications can connect to
  • Deploy WebSocket proxies that validate frame sizes before forwarding to vulnerable clients

🔍 How to Verify

Check if Vulnerable:

Check if undici version is below 6.24.0 (for v6) or below 7.24.0 (for v7)

Check Version:

npm list undici | grep undici

Verify Fix Applied:

Confirm undici version is 6.24.0+ or 7.24.0+ and test WebSocket functionality

📡 Detection & Monitoring

Log Indicators:

  • Node.js process crashes with TypeError related to ByteParser
  • WebSocket connection failures followed by process termination

Network Indicators:

  • Large WebSocket frames (64-bit length) from servers
  • Unusual WebSocket traffic patterns

SIEM Query:

process.name:"node" AND error:"TypeError" AND message:"ByteParser"

🔗 References

📤 Share & Export