CVE-2026-24873

7.8 HIGH

📋 TL;DR

An out-of-bounds read vulnerability in Rinnegatamante's lpp-vita software allows attackers to read memory beyond allocated buffers. This affects PlayStation Vita homebrew developers and users running vulnerable versions. The vulnerability could lead to information disclosure or potentially enable further exploitation.

💻 Affected Systems

Products:
  • Rinnegatamante lpp-vita
Versions: All versions before lpp-vita r6
Operating Systems: PlayStation Vita system software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects PlayStation Vita homebrew development using lpp-vita library.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure leading to memory content leakage, potentially enabling ASLR bypass or facilitating further exploitation chains.

🟠

Likely Case

Application crash or instability due to invalid memory access, with possible limited information disclosure.

🟢

If Mitigated

Minimal impact if proper memory protections are in place and the application runs with limited privileges.

🌐 Internet-Facing: LOW - lpp-vita is primarily used for local PlayStation Vita development, not typically exposed to internet.
🏢 Internal Only: MEDIUM - Could affect PlayStation Vita homebrew ecosystem and development environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting specific inputs to trigger the out-of-bounds read condition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: lpp-vita r6 and later

Vendor Advisory: https://github.com/Rinnegatamante/lpp-vita/pull/82

Restart Required: Yes

Instructions:

1. Update lpp-vita to version r6 or later. 2. Recompile any applications using lpp-vita with the updated library. 3. Redeploy updated applications to PlayStation Vita.

🔧 Temporary Workarounds

Input validation

all

Implement strict input validation in applications using lpp-vita to prevent triggering the vulnerable code path.

🧯 If You Can't Patch

  • Isolate PlayStation Vita systems running vulnerable applications from untrusted networks.
  • Monitor for application crashes or unusual behavior in lpp-vita based applications.

🔍 How to Verify

Check if Vulnerable:

Check lpp-vita version in development environment or application metadata.

Check Version:

Check lpp-vita source code or build configuration for version information.

Verify Fix Applied:

Confirm lpp-vita version is r6 or later and applications have been recompiled with updated library.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected application termination

Network Indicators:

  • Not applicable - primarily local vulnerability

SIEM Query:

Not applicable for typical PlayStation Vita homebrew environments.

🔗 References

📤 Share & Export