vendor:
Cyberoam Authentication Client
by:
Andrey Stoykov
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Cyberoam Authentication Client
Affected Version From: 2.1.2.7
Affected Version To: 2.1.2.7
Patch Exists: NO
Related CWE:
CPE: a:cyberoam:authentication_client:2.1.2.7
Platforms Tested: Windows Vista SP2 x86
2020
Cyberoam Authentication Client 2.1.2.7 – Buffer Overflow (SEH)
This exploit targets a buffer overflow vulnerability in the Cyberoam Authentication Client version 2.1.2.7. By copying the contents of 'sploit.txt' into the 'Cyberoam Server Address' field and clicking 'Check', a TCP shell will spawn on port 1337. The exploit uses msfvenom to generate a payload with bad characters to be avoided. It is tested on Windows Vista SP2 x86.
Mitigation:
Upgrade to a patched version of the Cyberoam Authentication Client.