Impact
A buffer overflow exists in the SNMP Auditor Community field of a specific software version. When an attacker supplies an overly long string to this field and triggers the walk operation, the application can crash. This results in a denial of service condition for users relying on the service. The weakness is a classic out‑of‑bounds write, identified by the assigned classification.
Affected Systems
Any installation of the auditing platform running the vulnerable version. The affected component is the SNMP Auditor module that processes community strings entered through its interface.
Risk and Exploitability
The vulnerability receives a 6.9 score on its severity scale, indicating moderate risk. The probability of widespread exploitation is low, with less than a one percent chance of being selected by threat actors. It is not listed in the known exploited vulnerability catalog. Local attackers who can input data into the community field can repeat the crash and disrupt service, but remote exploitation or privilege escalation is not indicated by the available information.
OpenCVE Enrichment