Cyber Posture

CVE-2020-37095

CriticalPublic PoC

Published: 07 February 2026

Published
07 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0018 39.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Cyberoam Authentication Client 2.1.2.7 contains a buffer overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) memory. Attackers can craft a malicious input in the 'Cyberoam Server Address' field to trigger a bind…

more

TCP shell on port 1337 with system-level access.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents buffer overflow exploitation by validating malicious inputs in the 'Cyberoam Server Address' field.

prevent

Implements memory safeguards like DEP and ASLR to protect against SEH overwrite attacks leading to arbitrary code execution.

preventrecover

Ensures timely patching and remediation of the buffer overflow flaw in Cyberoam Authentication Client version 2.1.2.7.

Security SummaryAI

CVE-2020-37095 is a buffer overflow vulnerability (CWE-121) affecting the Cyberoam Authentication Client version 2.1.2.7. The flaw enables remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) memory. It is triggered via a specially crafted malicious input in the 'Cyberoam Server Address' field, earning a critical CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote attackers require no privileges, authentication, or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation allows attackers to gain system-level access by triggering a bind TCP shell on port 1337.

References include an Exploit-DB entry at https://www.exploit-db.com/exploits/48148 detailing a public exploit, a Vulncheck advisory at https://www.vulncheck.com/advisories/cyberoam-authentication-client-buffer-overflow-seh, and software information at https://cyberoam-general-authentication-client.software.informer.com/2.1/. No specific patches or mitigations are detailed in the provided description or references.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Buffer overflow in client software enables remote code execution without authentication or user interaction, directly facilitating Exploitation for Client Execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References