Impact
A buffer overflow in the Absolute Software Secure Access Windows client allows an attacker with local machine control to trigger a failure that causes the system to stop responding and produce a blue screen. The vulnerability exploits memory‑management boundaries to corrupt critical data structures, leading to a crash that prevents the operating system from continuing to function normally. The effect is limited to disruption of local services and not to data loss or unauthorized control. The CVSS score of 5.9 reflects its moderate severity and local nature.
Affected Systems
All Windows installations of the Secure Access client version earlier than 14.50 are affected. The vulnerability exists in the client component that processes user input and network traffic specific to Secure Access. Users running these older client versions are at risk; newer releases (14.50 and above) contain the fix.
Risk and Exploitability
The score of 5.9 indicates a moderate risk, and the EPSS score of 0.00014 (~<1%) indicates a very low likelihood of exploitation in the wild. The vulnerability is not listed in CISA KEV, suggesting it has not yet been widely exploited. Exploitation requires local user privileges; an attacker would need to execute code on the machine. Once the overflow is triggered, the simplest consequence is a system crash, satisfying an attacker’s objective of causing downtime or forcing a user to reinstall or restore the system.
OpenCVE Enrichment