Impact
The vulnerability is a classic buffer overflow in the Share Name field of NetAware 1.20, which allows a local attacker to crash the application by supplying an excessively long string (around 1000 bytes). When the Manage Shares interface processes the input, the overflow leads to an uncontrolled termination of the program, effectively denying service to legitimate users. The weakness corresponds to CWE‑787, indicating lack of bounds checking for user input leading to memory corruption.
Affected Systems
The product affected is Infiltration‑Systems NetAware version 1.20. No other versions are listed as vulnerable and no additional affected vendors are mentioned. The shared product is a network awareness application that allows the user to add custom share definitions via a GUI interface.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate to high severity, while the EPSS score of less than 1% shows a very low probability of exploitation in the wild. The vulnerability is not included in CISA’s KEV catalog, suggesting it has not been widely exploited yet. The likely attack vector is local, requiring the attacker to have access to the machine running NetAware in order to input an oversized Share Name. No publicly documented remote exploitation method exists.
OpenCVE Enrichment