CVE-2026-33447
Analyzed Analyzed - Analysis Complete
Buffer Overflow in Secure Access Client

Publication date: 2026-04-30

Last updated on: 2026-05-05

Assigner: NetMotion Software

Description
CVE-2026-33447 is a buffer overflow in a message parsing function of the Secure Access client prior to 14.50. Attackers with control of a modified server can send a special packet that can overwrite a small portion of memory conceivably leading to memory corruption or denial of service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-30
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
absolute secure_access to 14.50 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

CVE-2026-33447 is a buffer overflow vulnerability that can lead to memory corruption or denial of service, impacting availability and integrity but not confidentiality.

Since the vulnerability does not affect confidentiality, it is less likely to directly impact compliance with regulations focused on data privacy and protection such as GDPR or HIPAA.

However, the potential denial of service or integrity issues could indirectly affect compliance if system availability or data integrity are critical under specific regulatory requirements.


Can you explain this vulnerability to me?

CVE-2026-33447 is a buffer overflow vulnerability found in the message parsing function of the Secure Access client software versions prior to 14.50.

An attacker who controls a modified server can send a specially crafted packet that overwrites a small portion of memory, potentially causing memory corruption or denial of service.


How can this vulnerability impact me? :

This vulnerability can lead to memory corruption or denial of service conditions on the affected Secure Access client.

The impact is limited to availability and integrity, meaning it can disrupt service or corrupt data, but it does not affect confidentiality.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade the Secure Access client software to version 14.50 or later, as the vulnerability exists in versions prior to 14.50.

Since the attack requires control of a modified server to send specially crafted packets, ensure that your network environment restricts connections to trusted servers only.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart