CVE-2026-40949
Analyzed Analyzed - Analysis Complete
Buffer Overflow in Secure Access Windows Client

Publication date: 2026-04-30

Last updated on: 2026-05-05

Assigner: NetMotion Software

Description
CVE-2026-40949 is a buffer overflow vulnerability in the Secure Access Windows client prior to 14.50. Attackers with local control of the Windows client can use it to trigger a denial of service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-30
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
absolute secure_access to 14.50 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-40949 is a buffer overflow vulnerability found in the Secure Access Windows client versions prior to 14.50. This vulnerability can be exploited by attackers who have local control over the Windows client.

By triggering this buffer overflow, an attacker can cause the application to crash or behave unexpectedly, leading to a denial of service condition.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker with local access to the Windows client to cause a denial of service. This means the Secure Access client could become unavailable or stop functioning properly, potentially disrupting your network access or security services.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Secure Access Windows client to version 14.50 or later, as the vulnerability affects versions prior to 14.50.

Since the vulnerability requires local attacker control, restricting local access to trusted users and systems can also help reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart