๐Ÿ” CVE Alert

CVE-2012-10060

UNKNOWN 0.0

Sysax Multi Server < 5.55 SSH Username Buffer Overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service.

CWE CWE-121
Vendor sysax software
Product multi server
Published Aug 13, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for sysax software multi server

Be the first to know when new unknown vulnerabilities affecting sysax software multi server are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Sysax Software / Multi Server
* < 5.55

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ssh/sysax_ssh_username.rb exploit-db.com: https://www.exploit-db.com/exploits/18535 exploit-db.com: https://www.exploit-db.com/exploits/18557 web.archive.org: https://web.archive.org/web/20120302203344/http://www.pwnag3.com/2012/02/sysax-multi-server-ssh-username-exploit.html advisories.checkpoint.com: https://advisories.checkpoint.com/defense/advisories/public/2012/cpai-23-sepc.html sysax.com: https://www.sysax.com/ vulncheck.com: https://www.vulncheck.com/advisories/sysax-multi-server-ssh-username-buffer-overflow

Credits

Craig Freyman