QID 375580

Date Published: 2021-05-25

QID 375580: SecureCRT Memory Corruption Vulnerability

SecureCRT client provides terminal emulation with the strong encryption, broad range of authentication options, and data integrity for SSH protocol used for secure network administration and end user access.

CVE-2020-12651: SecureCRT is vulnerable to buffer overflow vulnerability which results in arbitrary code execution.

Affected Version:
SecureCRT version 8.7.1 and earlier

QID Detection Logic (authenticated):
Windows: The QID check for the vulnerable version of SecureCRT.exe. The location of the file is determined with the help of the registry key "HKLM\SOFTWARE\VanDyke\SecureCRT\Install" value "Main Directory".
Linux: This QID checks to see if the target is running a vulnerable version of SecureCRT.

Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code on the vulnerable target system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Customers are advised to download SecureCRT 8.7.2 or later versions to remediating this vulnerability.

    CVEs related to QID 375580

    Software Advisories
    Advisory ID Software Component Link
    SecureCRT Advisory URL Logo www.vandyke.com/support/advisory/2020/05/index.html