Impact
A buffer overflow flaw exists in the Secure Access client authentication subsystem before version 14.50. An attacker who can control a modified server can send a specially crafted packet to a client, causing a small portion of memory to be overwritten. This memory corruption can potentially degrade the client’s functionality or result in a denial of service. The description explicitly references memory corruption or denial of service, but does not claim remote code execution, so the primary impact is service disruption.
Affected Systems
This vulnerability affects the Absolute Software Secure Access client for all releases prior to 14.50. Users running any earlier version of the Secure Access client are susceptible to the described buffer overflow.
Risk and Exploitability
The CVSS score of 2.3 indicates a low‑severity issue; the EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote: an attacker must control a server that clients contact, enabling the malicious packet to reach vulnerable clients. Given the lack of publicly available exploit code and the low severity rating, the current risk of exploitation is low, but service interruption remains possible if a malicious server can communicate with the client.
OpenCVE Enrichment