CVE-2026-40949
Buffer Overflow in Secure Access Windows Client
Publication date: 2026-04-30
Last updated on: 2026-05-05
Assigner: NetMotion Software
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| absolute | secure_access | to 14.50 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-40949 is a buffer overflow vulnerability found in the Secure Access Windows client versions prior to 14.50. This vulnerability can be exploited by attackers who have local control over the Windows client.
By triggering this buffer overflow, an attacker can cause the application to crash or behave unexpectedly, leading to a denial of service condition.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker with local access to the Windows client to cause a denial of service. This means the Secure Access client could become unavailable or stop functioning properly, potentially disrupting your network access or security services.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Secure Access Windows client to version 14.50 or later, as the vulnerability affects versions prior to 14.50.
Since the vulnerability requires local attacker control, restricting local access to trusted users and systems can also help reduce risk.