CVE-2018-25280
Received Received - Intake
Buffer Overflow in Infiltrator Scanner 4.6 Causes DoS

Publication date: 2026-04-26

Last updated on: 2026-04-26

Assigner: VulnCheck

Description
Infiltrator Network Security Scanner 4.6 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized input string. Attackers can paste a 6000-byte payload into the Scan Target field and trigger a denial of service condition when the Scan button is clicked.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-26
Last Modified
2026-04-26
Generated
2026-05-07
AI Q&A
2026-04-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
infiltrator_network_security infiltrator_network_security_scanner 4.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-120 The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Infiltrator Network Security Scanner version 4.6 and is a buffer overflow issue. It allows local attackers to crash the application by providing an input string that is too large. Specifically, an attacker can paste a 6000-byte payload into the Scan Target field and cause the application to crash when the Scan button is clicked.


How can this vulnerability impact me? :

The primary impact of this vulnerability is a denial of service (DoS) condition. An attacker with local access can cause the Infiltrator Network Security Scanner application to crash by supplying an oversized input, disrupting normal operation and potentially affecting availability.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, avoid supplying oversized input strings, specifically inputs around 6000 bytes, into the Scan Target field of Infiltrator Network Security Scanner 4.6.

Ensure that users do not click the Scan button after entering such large inputs to prevent triggering the denial of service condition.

Limit local user access to the application to reduce the risk of local attackers exploiting this buffer overflow vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart