#VU110640 Stack-based buffer overflow in Kerio Connect - CVE-2023-25267

 

#VU110640 Stack-based buffer overflow in Kerio Connect - CVE-2023-25267

Published: June 8, 2025


Vulnerability identifier: #VU110640
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2023-25267
CWE-ID: CWE-121
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Kerio Connect
Software vendor:
GFI Software

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the 2FASetup function when processing an authenticated request with a long primaryEMailAddress field to the webmail/api/jsonrpc URI. A remote authenticated user can send a specially crafted HTTP request to the webmail interface, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.

External links