First published: Fri Sep 20 2024(Updated: )
Secure Email Gateway from Cellopoint has Buffer Overflow Vulnerability in authentication process. Remote unauthenticated attackers can send crafted packets to crash the process, thereby bypassing authentication and obtaining system administrator privileges.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Cellopoint Secure Email Gateway | >=4.2.1<=4.5.0 |
Install patch Build_20240712 or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9043 is classified as a critical vulnerability due to its potential to allow unauthorized system administrator access.
To fix CVE-2024-9043, users should update to a version of Cellopoint Secure Email Gateway newer than 4.5.0.
CVE-2024-9043 affects all versions of Cellopoint Secure Email Gateway from 4.2.1 to 4.5.0.
CVE-2024-9043 is a buffer overflow vulnerability that occurs during the authentication process.
Yes, CVE-2024-9043 can be exploited remotely by unauthenticated attackers who send crafted packets.