Cyber Posture

CVE-2020-36961

CriticalPublic PoC

Published: 28 January 2026

Published
28 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0026 49.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

10-Strike Network Inventory Explorer 8.65 contains a buffer overflow vulnerability in exception handling that allows remote attackers to execute arbitrary code. Attackers can craft a malicious file with 209 bytes of padding and a specially constructed Structured Exception Handler to…

more

trigger code execution.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely patching and remediation of the stack-based buffer overflow vulnerability in 10-Strike Network Inventory Explorer to eliminate the remote code execution risk.

prevent

Implements memory protections like ASLR and DEP that directly thwart exploitation of stack-based buffer overflows via SEH overwrites.

prevent

Enforces validation of file inputs to block specially crafted malicious files with padding and SEH structures that trigger the buffer overflow.

Security SummaryAI

CVE-2020-36961 is a stack-based buffer overflow vulnerability (CWE-121) in the exception handling mechanism of 10-Strike Network Inventory Explorer version 8.65. The flaw occurs when processing a specially crafted malicious file that includes 209 bytes of padding followed by a specially constructed Structured Exception Handler (SEH), enabling remote attackers to execute arbitrary code.

Remote attackers can exploit this vulnerability without authentication or user interaction, as reflected in its critical CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Exploitation requires low complexity and allows attackers to achieve high-impact confidentiality, integrity, and availability compromises, potentially leading to full remote code execution on affected systems running the vulnerable software.

References include the vendor site at https://www.10-strike.com, a public proof-of-concept exploit at https://www.exploit-db.com/exploits/49134, and a VulnCheck advisory at https://www.vulncheck.com/advisories/strike-network-inventory-explorer-buffer-overflow-seh. Security practitioners should review these sources for any available patches, workarounds, or detailed remediation guidance.

The availability of a public exploit on Exploit-DB highlights the risk of real-world exploitation against unpatched instances of this network inventory tool.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a remote stack-based buffer overflow in a network inventory application, enabling unauthenticated attackers to achieve arbitrary code execution over the network without user interaction, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References