Impact
SC 7.16 has a stack‑based buffer overflow that allows a local attacker to supply an input string larger than 1052 bytes, overwriting the instruction pointer and executing shellcode within the application process. This flaw enables arbitrary code execution, compromising the confidentiality, integrity, and availability of the host system.
Affected Systems
The vulnerability affects the SC product version 7.16. Users running this build should verify their installation version and apply any available fix or upgrade to a non‑vulnerable release.
Risk and Exploitability
The CVSS score of 8.6 classifies this flaw as high severity. The EPSS score is below 1% and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires local access or the ability to supply oversized input to the application, and once triggered it results in code execution at the privileges of the running service.
OpenCVE Enrichment