CVE-2026-33446
Buffer Overflow in Secure Access Client
Publication date: 2026-04-30
Last updated on: 2026-05-05
Assigner: NetMotion Software
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| absolute | secure_access | to 14.50 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update the Secure Access client to version 14.50 or later, as the buffer overflow issue is present only in versions prior to 14.50.
Additionally, since the attack requires control of a modified server sending specially crafted packets, ensure that your network only connects to trusted servers and monitor for any unusual or unauthorized server connections.
Can you explain this vulnerability to me?
CVE-2026-33446 is a buffer overflow vulnerability in the authentication sub-system of the Secure Access client prior to version 14.50.
Attackers who control a modified server can send a specially crafted packet that overwrites a small portion of memory, potentially causing memory corruption or a denial of service.
How can this vulnerability impact me? :
This vulnerability can lead to memory corruption or a denial of service condition in the Secure Access client.
The impact is limited to availability, meaning it can disrupt service but does not affect confidentiality or integrity of data.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability described in CVE-2026-33446 is a buffer overflow that can lead to memory corruption or denial of service, but it does not impact confidentiality or integrity of data.
Since there is no impact on confidentiality or integrity, this vulnerability is unlikely to directly affect compliance with standards and regulations such as GDPR or HIPAA, which primarily focus on protecting personal data confidentiality and integrity.
However, the potential for denial of service could affect availability, which may have indirect implications depending on the specific compliance requirements related to system availability.