{"vulnerability": "CVE-2026-42511", "sightings": [{"uuid": "be018691-7c1b-4d3c-a10d-a167ec786f26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42511", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3mkzuipjhgo2f", "content": "~Cybergcca~\nCCCS released 5 advisories covering critical updates for IBM, Dell, FreeBSD, Ubuntu, and CISA ICS products.\n-\nIOCs: CVE-2026-42511, CVE-2026-7270, CVE-2026-7164\n-\n#PatchManagement #ThreatIntel #Vulnerability", "creation_timestamp": "2026-05-04T14:19:12.994542Z"}, {"uuid": "8a9ee58a-4e86-4aaa-97d4-4a8e37272ffa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42511", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mkz7x57ibs2o", "content": "CVE-2026-42511: Critical FreeBSD DHCP Flaw Grants Attackers Root Access \u2013 Patch Now! +\u00a0Video\n\nIntroduction: The Dynamic Host Configuration Protocol (DHCP) automates IP address assignment on networks, but a newly disclosed vulnerability in FreeBSD\u2019s default IPv4 DHCP client (dhclient) flips this\u2026", "creation_timestamp": "2026-05-04T08:11:30.032512Z"}, {"uuid": "548d4389-e932-4ffe-94df-e4682b9edc5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42511", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3mkzbqip3bh2e", "content": "Critical FreeBSD DHCP Flaw Enables Full System Takeover via Local Network\u00a0Attack\n\nIntroduction: A Silent Network Threat with Root-Level Consequences A newly disclosed vulnerability in FreeBSD has raised serious concerns across the cybersecurity community. This flaw, identified as CVE-2026-42511,\u2026", "creation_timestamp": "2026-05-04T08:43:33.384038Z"}, {"uuid": "d1299dde-bf70-4be0-a54f-09e0a52217aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42511", "type": "seen", "source": "https://bsky.app/profile/camorabug.com/post/3ml3sm5jyic24", "content": "FreeBSD DHCP Client Vulnerability Enables Remote Code Execution as\u00a0Root\n\nThe FreeBSD Project has released a critical security advisory addressing a severe flaw in its default IPv4 DHCP client. Tracked as\u00a0CVE-2026-42511, this vulnerability allows a local network attacker to execute arbitrary code as\u2026", "creation_timestamp": "2026-05-05T08:50:40.895719Z"}, {"uuid": "0ebacd3c-80ee-49a6-84ab-2386ebf58cca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-42511", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/freebsd-security-advisory-av26-415", "content": "", "creation_timestamp": "2026-05-04T06:44:59.000000Z"}, {"uuid": "52951fa1-4bcb-4eab-8622-4216c94a0e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42511", "type": "seen", "source": "https://bsky.app/profile/infosecbot.bsky.social/post/3ml3elpzaql2c", "content": "This one is ours! CVE-2026-42511 was discovered by Joshua Rogers from our research team using \n@Aisle_Inc\n's AI system in FreeBSD, the same codebase Anthropic previously scanned with Mythos.\n\nRemote\u2026\n\n\ud83d\udd01 RT @stanislavfort | reposted by @thegrugq\nhttps://x.com/stanislavfort/status/2051374200078598606", "creation_timestamp": "2026-05-05T04:39:55.225415Z"}, {"uuid": "6db78167-74ae-48b4-ba20-73dfd3445c60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42511", "type": "seen", "source": "https://bsky.app/profile/jj1bdx.tokyo/post/3mkzp6bi7o22b", "content": "Update your FreeBSD system NOW.\n\n&gt; Topic: Remote code execution via malicious DHCP options \n&gt; Affects: All supported versions of FreeBSD.\n&gt; CVE Name: CVE-2026-42511\n\n&gt; A rogue DHCP server may be able to execute arbitrary code as root on a system running dhclient.", "creation_timestamp": "2026-05-04T12:43:54.781262Z"}, {"uuid": "2f53322f-0593-47d6-8202-e231b2ddb78c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42511", "type": "seen", "source": "https://bsky.app/profile/camorabug.com/post/3ml3wbwwvr42q", "content": "FreeBSD DHCP Client Vulnerability Enables Remote Code Execution as\u00a0Root\n\nThe FreeBSD Project has released a critical security advisory addressing a severe flaw in its default IPv4 DHCP client. Tracked as\u00a0CVE-2026-42511, this vulnerability allows a local network attacker to execute arbitrary code as\u2026", "creation_timestamp": "2026-05-05T09:56:32.787872Z"}, {"uuid": "8e8977f0-32d1-4749-aec6-0e60978b1523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42511", "type": "seen", "source": "https://bsky.app/profile/hillu.bsky.social/post/3ml4innjvnc2c", "content": "Not sure if it was a good idea to look into this so closely: CVE-2026-42511 ( #freebsd #dhclient #rce)  looks awfully similar to CVE-2011-0997 (isc-dhcp).", "creation_timestamp": "2026-05-05T15:25:12.962865Z"}, {"uuid": "0a5cd613-7daf-448f-bac5-3b7de73d1ca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42511", "type": "seen", "source": "https://bsky.app/profile/camorabug.com/post/3ml3oys7wsl2n", "content": "FreeBSD DHCP Client Vulnerability Enables Remote Code Execution as\u00a0Root\n\nThe FreeBSD Project has issued a critical security advisory concerning a severe vulnerability found in its default IPv4 DHCP client. Designated as CVE-2026-42511, this flaw enables a local network attacker to execute arbitrary\u2026", "creation_timestamp": "2026-05-05T07:46:09.940401Z"}, {"uuid": "4ca02743-4c95-4e50-85e3-56507352ebad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42511", "type": "seen", "source": "https://bsky.app/profile/hillu.bsky.social/post/3ml4whiydik2r", "content": "Not sure if it was a good idea to look into this so closely: CVE-2026-42511 ( #freebsd #dhclient #rce)  looks awfully similar to CVE-2011-0997 (isc-dhcp).", "creation_timestamp": "2026-05-05T19:32:19.026452Z"}]}