CVE-2026-33449
Buffer Overflow in Secure Access Client
Publication date: 2026-04-30
Last updated on: 2026-05-05
Assigner: NetMotion Software
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| absolute | secure_access | to 14.50 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any direct impact of CVE-2026-33449 on compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
CVE-2026-33449 is a buffer overflow vulnerability found in a message handling function of the Secure Access client software versions prior to 14.50.
An attacker who controls a modified server can send a specially crafted, cryptographically valid message to the client, which causes a small portion of the client's memory to be overwritten.
This memory overwrite can potentially lead to a denial of service condition on the client.
How can this vulnerability impact me? :
This vulnerability can impact you by causing a denial of service on the Secure Access client.
If an attacker controls a malicious server, they can exploit this flaw to disrupt the normal operation of the client by sending a crafted message that overwrites part of the client's memory.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update the Secure Access client to version 14.50 or later, as versions prior to 14.50 are affected by the buffer overflow issue.