Description
Stack-based Buffer Overflow vulnerability in the WatchGuard Agent discovery service on Windows allows Overflow Buffers. An unauthenticated attacker on the same local network could exploit this vulnerability to crash the agent service.
Published: 2026-05-06
Score: 7.1 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A stack‑based buffer overflow exists in the watchful discovery service of the WatchGuard Agent on Windows. An attacker may write data past the bounds of a local buffer, which causes the service to crash. The crash results in a denial of service that can disrupt monitoring or management functions performed by the agent. The weakness is characterized as CWE‑121.

Affected Systems

The flaw affects the WatchGuard Agent software installed on Windows operating systems. No specific version information is disclosed, so all installations of this agent are potentially vulnerable until a patch is applied.

Risk and Exploitability

The CVSS score of 7.1 reflects a moderate to high severity scenario. The vulnerability requires an unauthenticated attacker who has access to the same local network segment as the agent host, and exploitation can be performed without authentication. No default or public exploits are known, and the issue is not listed in the CISA KEV catalog, but the lack of EPSS data means potential exploitation remains uncertain. The impact is limited to the interruption of the agent service, yet it may affect the availability of network‑security services for the organization.

Generated by OpenCVE AI on May 6, 2026 at 17:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WatchGuard Agent to the latest version that contains the buffer overflow fix.
  • If upgrading is not immediately possible, disable the WatchGuard Agent Discovery Service to prevent exploitation.
  • Implement network segmentation to restrict local network segments that can communicate with the agent, reducing exposure to unauthenticated attackers.

Generated by OpenCVE AI on May 6, 2026 at 17:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 06 May 2026 16:15:00 +0000

Type Values Removed Values Added
Description Stack-based Buffer Overflow vulnerability in the WatchGuard Agent discovery service on Windows allows Overflow Buffers. An unauthenticated attacker on the same local network could exploit this vulnerability to crash the agent service.
Title Stack-based Buffer Overflow in WatchGuard Agent Discovery Service on Windows Causes Denial of Service - Variant B
First Time appeared Watchguard Technologies
Watchguard Technologies single Watchguard Agent
Weaknesses CWE-121
CPEs cpe:2.3:a:watchguard_technologies:single_watchguard_agent:*:*:*:*:*:*:*:*
Vendors & Products Watchguard Technologies
Watchguard Technologies single Watchguard Agent
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Watchguard Technologies Single Watchguard Agent
cve-icon MITRE

Status: PUBLISHED

Assigner: WatchGuard

Published:

Updated: 2026-05-06T16:11:26.423Z

Reserved: 2026-04-20T09:57:56.545Z

Link: CVE-2026-41286

cve-icon Vulnrichment

Updated: 2026-05-06T16:11:21.855Z

cve-icon NVD

Status : Received

Published: 2026-05-06T16:16:09.950

Modified: 2026-05-06T16:16:09.950

Link: CVE-2026-41286

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T18:00:12Z

Weaknesses