CVE-2026-24812

N/A Unknown

📋 TL;DR

This vulnerability in ROOT's built-in zlib modules (specifically inftrees.C) could allow memory corruption or code execution when processing compressed data. It affects all ROOT installations up to version 6.36.00-rc1. Users who process untrusted compressed data with ROOT are at risk.

💻 Affected Systems

Products:
  • ROOT (root-project/root)
Versions: through 6.36.00-rc1
Operating Systems: All platforms running ROOT
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in built-in zlib modules, so any ROOT installation using these modules is affected regardless of external zlib installation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise if ROOT processes malicious compressed data from untrusted sources.

🟠

Likely Case

Application crash or denial of service when processing malformed compressed data, potentially causing data loss in scientific workflows.

🟢

If Mitigated

Limited impact if ROOT only processes trusted data sources and runs with minimal privileges.

🌐 Internet-Facing: LOW (ROOT is typically used for scientific data analysis, not as an internet-facing service)
🏢 Internal Only: MEDIUM (Risk exists if processing untrusted data files within internal networks)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious compressed data that triggers the vulnerability in inftrees.C. No public exploit details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 6.36.00-rc1 (check specific fix in PR #18527)

Vendor Advisory: https://github.com/root-project/root/pull/18527

Restart Required: Yes

Instructions:

1. Update ROOT to version after 6.36.00-rc1. 2. Recompile any custom ROOT-based applications. 3. Restart services using ROOT.

🔧 Temporary Workarounds

Disable built-in zlib

all

Force ROOT to use system zlib library instead of vulnerable built-in modules

Configure ROOT with -Dbuiltin_zlib=OFF during build

Input validation

all

Validate compressed data before processing with ROOT

🧯 If You Can't Patch

  • Restrict ROOT to process only trusted, verified data sources
  • Run ROOT in isolated containers with minimal privileges

🔍 How to Verify

Check if Vulnerable:

Check ROOT version: root-config --version and compare to 6.36.00-rc1

Check Version:

root-config --version

Verify Fix Applied:

Verify version is newer than 6.36.00-rc1 and check that PR #18527 fixes are included

📡 Detection & Monitoring

Log Indicators:

  • ROOT segmentation faults
  • Unexpected crashes when processing compressed data
  • Memory corruption errors in ROOT logs

Network Indicators:

  • Unusual compressed data transfers to ROOT systems

SIEM Query:

Process:name="root" AND (EventID:1000 OR ExceptionCode:c0000005)

🔗 References

📤 Share & Export