Impact
The WatchGuard Agent contains a stack‑based buffer overflow that can be triggered in its discovery service on Windows, leading the agent service to crash. This flaw creates a denial of service without requiring authentication, allowing a local network attacker to interrupt service availability. The weakness is a missing bounds check that allows a malicious packet to overflow the stack, classified as CWE‑121.
Affected Systems
Vendors affected are WatchGuard. The only product identified is the WatchGuard Agent, operating on Windows. No specific version ranges are listed, but all releases of the agent susceptible to the flaw could be impacted.
Risk and Exploitability
With a CVSS score of 7.1 the vulnerability is rated medium‑high severity. No EPSS data is supplied, so the likelihood of exploitation is unknown. The flaw is local‑network bound; an unauthenticated user on the same LAN can craft a request to overflow the buffer. Because the exploit results in a crash rather than code execution, it does not compromise confidentiality or integrity, only disrupts availability. The vulnerability is not currently listed in the CISA KEV catalog, suggesting no publicly known widespread exploitation as of the latest data.
OpenCVE Enrichment