CVE-2020-37138
Buffer Overflow in 10-Strike Network Inventory Allows RCE
Publication date: 2026-02-05
Last updated on: 2026-02-05
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| 10-strike | network_inventory_explorer | 9.03 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a buffer overflow in the 10-Strike Network Inventory Explorer version 9.03, specifically in the file import functionality where the software loads a list of computers from a text file.
An attacker can create a specially crafted malicious text file that triggers a stack-based buffer overflow when loaded by the application. This overflow allows the attacker to overwrite the Structured Exception Handler (SEH) and use Return-Oriented Programming (ROP) techniques to bypass Data Execution Prevention (DEP) on Windows systems.
By exploiting this vulnerability, the attacker can execute arbitrary code on the affected system, demonstrated by a proof-of-concept payload that launches the calculator application (calc.exe). The exploit requires local access to run the malicious file within the application.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with local access to execute arbitrary code on your system by loading a maliciously crafted text file into the 10-Strike Network Inventory Explorer software.
Successful exploitation could lead to unauthorized actions such as running malicious programs, potentially compromising system integrity, confidentiality, and availability.
Since the exploit bypasses Data Execution Prevention, it can execute code even on systems with some security mitigations enabled, increasing the risk of compromise.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability is triggered locally by loading a specially crafted text file into the 10-Strike Network Inventory Explorer 9.03 application via the "From Text File" button under the "Computers" tab.'}, {'type': 'paragraph', 'content': 'Detection involves identifying if the vulnerable version (9.03) of 10-Strike Network Inventory Explorer is installed and monitoring for attempts to load suspicious or unusually large text files through the file import functionality.'}, {'type': 'paragraph', 'content': 'Since the exploit uses a crafted TXT file to trigger a buffer overflow, you can check for the presence of such files or monitor application logs for crashes with access violation errors (exception code c0000005) related to the file import process.'}, {'type': 'paragraph', 'content': 'No specific detection commands are provided in the resources, but general steps include:'}, {'type': 'list_item', 'content': 'Verify the installed version of 10-Strike Network Inventory Explorer (e.g., check via Control Panel or software inventory commands).'}, {'type': 'list_item', 'content': 'Monitor application logs or Windows Event Viewer for crashes or exceptions related to NetworkInventoryExplorer.exe.'}, {'type': 'list_item', 'content': 'Scan for suspicious TXT files that might be used to exploit the vulnerability, especially those with unusually large sizes (~5000 bytes) or abnormal content.'}, {'type': 'list_item', 'content': 'Use process monitoring tools (like Sysinternals Process Monitor) to observe file access and application behavior during file imports.'}] [2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include:
- Avoid loading text files from untrusted or unknown sources into the 10-Strike Network Inventory Explorer 9.03 application.
- Restrict user permissions to prevent unauthorized users from running or interacting with the vulnerable application.
- Monitor and block attempts to use the file import functionality with suspicious or crafted TXT files.
- If possible, upgrade to a patched or newer version of the software that addresses this vulnerability (no patch details are provided in the resources).
- Implement application whitelisting or sandboxing to limit the impact of potential exploitation.