CVE-2026-40951
Received Received - Intake
Memory Corruption DoS in Secure Access Windows Client

Publication date: 2026-04-30

Last updated on: 2026-05-04

Assigner: NetMotion Software

Description
CVE-2026-40951 is a memory corruption vulnerability on Secure Access Windows clients prior to 14.50. Attackers with local control of the Windows client can send malformed data to an API and trigger a denial of service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-30
Last Modified
2026-05-04
Generated
2026-05-07
AI Q&A
2026-05-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
absolute secure_access to 14.50 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-40951 is a memory corruption vulnerability found in Secure Access Windows clients before version 14.50. It occurs when an attacker with local access to the Windows client sends malformed data to an API, which then triggers a denial of service condition.


How can this vulnerability impact me? :

This vulnerability can lead to a denial of service on the affected Secure Access Windows client. An attacker with local control can exploit this by sending malformed data, potentially causing the application or system to crash or become unresponsive.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

CVE-2026-40951 causes a denial of service by exploiting a memory corruption vulnerability in Secure Access Windows clients prior to version 14.50. The impact is limited to availability, with no effect on confidentiality or integrity.

Since the vulnerability does not affect confidentiality or integrity of data, it is less likely to directly violate compliance requirements related to data protection under standards like GDPR or HIPAA, which primarily focus on protecting personal data confidentiality and integrity.

However, the denial of service impact could affect system availability, which is also a component of some compliance frameworks. Organizations relying on Secure Access Windows clients should consider the potential availability impact in their risk assessments and mitigation strategies.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update Secure Access Windows clients to version 14.50 or later, as versions prior to 14.50 are affected.

Since the vulnerability requires local attacker access, restricting local access to trusted users and monitoring for unusual local activity can also help reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart