Vulnerability Description
Cyberoam Authentication Client 2.1.2.7 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) memory. Attackers can craft a malicious input in the 'Cyberoam Server Address' field to trigger a bind TCP shell on port 1337 with system-level access.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://cyberoam-general-authentication-client.software.informer.com/2.1/
- https://www.exploit-db.com/exploits/48148
- https://www.vulncheck.com/advisories/cyberoam-authentication-client-buffer-overf
FAQ
What is CVE-2020-37095?
CVE-2020-37095 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Cyberoam Authentication Client 2.1.2.7 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) memory. Attacke...
How severe is CVE-2020-37095?
CVE-2020-37095 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-37095?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.