{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1991","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-05T15:43:47.726Z","datePublished":"2026-02-06T05:32:08.140Z","dateUpdated":"2026-02-23T09:21:46.700Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:21:46.700Z"},"title":"libuvc UVC Descriptor device.c uvc_scan_streaming null pointer dereference","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-476","lang":"en","description":"NULL Pointer Dereference"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-404","lang":"en","description":"Denial of Service"}]}],"affected":[{"vendor":"n/a","product":"libuvc","versions":[{"version":"0.0.1","status":"affected"},{"version":"0.0.2","status":"affected"},{"version":"0.0.3","status":"affected"},{"version":"0.0.4","status":"affected"},{"version":"0.0.5","status":"affected"},{"version":"0.0.6","status":"affected"},{"version":"0.0.7","status":"affected"}],"modules":["UVC Descriptor Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in libuvc up to 0.0.7. Affected is the function uvc_scan_streaming of the file src/device.c of the component UVC Descriptor Handler. The manipulation results in null pointer dereference. The attack needs to be approached locally. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":1.7,"vectorString":"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-05T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-07T13:18:57.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Oneafter (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.344509","name":"VDB-344509 | libuvc UVC Descriptor device.c uvc_scan_streaming null pointer dereference","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.344509","name":"VDB-344509 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.743388","name":"Submit #743388 | libuvc v0.0.7 and master-branch NULL Pointer Dereference","tags":["third-party-advisory"]},{"url":"https://github.com/libuvc/libuvc/issues/300","tags":["issue-tracking"]},{"url":"https://github.com/oneafter/0104/blob/main/repro","tags":["exploit"]},{"url":"https://github.com/libuvc/libuvc/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-06T20:24:58.826447Z","id":"CVE-2026-1991","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-06T20:25:08.368Z"}}]}}