Impact
NetAware 1.20 includes a buffer overflow in the User Blocking feature that allows a local attacker to crash the application by entering an oversized 512‑byte buffer into the "Add a website or keyword to be filtered" field. This local vulnerability results in a denial of service, leading to application downtime without providing an attacker additional privileges or data access.
Affected Systems
The affected system is Infiltration‑Systems NetAware version 1.20. The flaw is exploitable on installations of this exact version and applies to the local user interface of the application.
Risk and Exploitability
The vulnerability carries a CVSS score of 6.9, indicating medium severity. The EPSS score is less than 1%, and it is not listed in CISA’s KEV catalog, suggesting low likelihood of current exploitation. The attack vector is local, requiring a user who can input data into the add block field and subsequently delete the block entry to trigger the crash. Because of the local requirement and low exploit probability, the overall risk is moderate, but the impact on service availability can be significant if exploitation occurs.
OpenCVE Enrichment