CVE-2026-33447
Buffer Overflow in Secure Access Client
Publication date: 2026-04-30
Last updated on: 2026-05-05
Assigner: NetMotion Software
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| absolute | secure_access | to 14.50 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
CVE-2026-33447 is a buffer overflow vulnerability that can lead to memory corruption or denial of service, impacting availability and integrity but not confidentiality.
Since the vulnerability does not affect confidentiality, it is less likely to directly impact compliance with regulations focused on data privacy and protection such as GDPR or HIPAA.
However, the potential denial of service or integrity issues could indirectly affect compliance if system availability or data integrity are critical under specific regulatory requirements.
Can you explain this vulnerability to me?
CVE-2026-33447 is a buffer overflow vulnerability found in the message parsing function of the Secure Access client software versions prior to 14.50.
An attacker who controls a modified server can send a specially crafted packet that overwrites a small portion of memory, potentially causing memory corruption or denial of service.
How can this vulnerability impact me? :
This vulnerability can lead to memory corruption or denial of service conditions on the affected Secure Access client.
The impact is limited to availability and integrity, meaning it can disrupt service or corrupt data, but it does not affect confidentiality.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade the Secure Access client software to version 14.50 or later, as the vulnerability exists in versions prior to 14.50.
Since the attack requires control of a modified server to send specially crafted packets, ensure that your network environment restricts connections to trusted servers only.