Impact
Backup Key Recovery version 2.2.4 contains a buffer overflow in the Name field that allows a local attacker to crash the application. By submitting a string of 300 or more characters during registration, the program can be forced to terminate unexpectedly, causing an interruption of service for legitimate users. The vulnerability is an example of improper input validation and results in a denial of service.
Affected Systems
The affected product is Nsauditor Backup Key Recovery, specifically version 2.2.4. No other versions or vendors are listed. The issue is limited to this product.
Risk and Exploitability
The vulnerability has a moderate CVSS score of 6.9, indicating a high potential impact on availability. Exploit probability data is not available, and the vulnerability is not listed in the CISA KEV catalog. Attackers must have local access to the system to exploit the flaw, suggesting that insider or compromised credentials are required. Because the flaw can be triggered by an administrator‑level user, the risk to environments where such users exist is significant.
OpenCVE Enrichment