CVE-2026-33449
Analyzed Analyzed - Analysis Complete
Buffer Overflow in Secure Access Client

Publication date: 2026-04-30

Last updated on: 2026-05-05

Assigner: NetMotion Software

Description
CVE-2026-33449 is a buffer overflow in a message handling function of the Secure Access client prior to 14.50. Attackers with control of a modified server can send a cryptographically valid message to the client, overwriting a small portion of memory conceivably leading to a denial of service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-30
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
absolute secure_access to 14.50 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of CVE-2026-33449 on compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

CVE-2026-33449 is a buffer overflow vulnerability found in a message handling function of the Secure Access client software versions prior to 14.50.

An attacker who controls a modified server can send a specially crafted, cryptographically valid message to the client, which causes a small portion of the client's memory to be overwritten.

This memory overwrite can potentially lead to a denial of service condition on the client.


How can this vulnerability impact me? :

This vulnerability can impact you by causing a denial of service on the Secure Access client.

If an attacker controls a malicious server, they can exploit this flaw to disrupt the normal operation of the client by sending a crafted message that overwrites part of the client's memory.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should update the Secure Access client to version 14.50 or later, as versions prior to 14.50 are affected by the buffer overflow issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart