CVE-2020-37095
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
Cyberoam Authentication Client 2.1.2.7 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) memory. Attackers can craft a malicious input in the 'Cyberoam Server Address' field to trigger a bind TCP shell on port 1337 with system-level access.
Analysis
Cyberoam Authentication Client 2.1.2.7 has a buffer overflow allowing remote attackers to execute code through the network authentication service.
Technical Context
Cyberoam Authentication Client 2.1.2.7 has a CWE-121 stack buffer overflow in its network communication handler.
Affected Products
['Cyberoam Authentication Client 2.1.2.7']
Remediation
Update the client software.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today