CVE-2026-33446
Analyzed Analyzed - Analysis Complete
Buffer Overflow in Secure Access Client

Publication date: 2026-04-30

Last updated on: 2026-05-05

Assigner: NetMotion Software

Description
CVE-2026-33446 is a buffer overflow in the authentication sub-system of the Secure Access client prior to 14.50. Attackers with control of a modified server can send a special packet that can overwrite a small portion of memory conceivably leading to memory corruption or a denial of service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-30
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-04-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
absolute secure_access to 14.50 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-120 The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should update the Secure Access client to version 14.50 or later, as the buffer overflow issue is present only in versions prior to 14.50.

Additionally, since the attack requires control of a modified server sending specially crafted packets, ensure that your network only connects to trusted servers and monitor for any unusual or unauthorized server connections.


Can you explain this vulnerability to me?

CVE-2026-33446 is a buffer overflow vulnerability in the authentication sub-system of the Secure Access client prior to version 14.50.

Attackers who control a modified server can send a specially crafted packet that overwrites a small portion of memory, potentially causing memory corruption or a denial of service.


How can this vulnerability impact me? :

This vulnerability can lead to memory corruption or a denial of service condition in the Secure Access client.

The impact is limited to availability, meaning it can disrupt service but does not affect confidentiality or integrity of data.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability described in CVE-2026-33446 is a buffer overflow that can lead to memory corruption or denial of service, but it does not impact confidentiality or integrity of data.

Since there is no impact on confidentiality or integrity, this vulnerability is unlikely to directly affect compliance with standards and regulations such as GDPR or HIPAA, which primarily focus on protecting personal data confidentiality and integrity.

However, the potential for denial of service could affect availability, which may have indirect implications depending on the specific compliance requirements related to system availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart