CVE-2026-32661 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: May 13, 2026
GUARDIANWALL MailSuite & Mail Security Cloud - Buffer Overflow
Overview
GUARDIANWALL MailSuite and Mail Security Cloud contain a stack-based buffer overflow caused by improper handling of specially crafted requests in the web service, letting remote attackers execute arbitrary code, exploit requires product configured to run pop3wallpasswd with grdnwww user privilege.
Severity & Score
Impact
Remote attackers can execute arbitrary code, potentially leading to full system compromise.
Mitigation
Update to the latest version with the buffer overflow fix.
References
Social Media Activity(1 post)
🚨 CRITICAL: CVE-2026-32661 stack buffer overflow in Canon GUARDIANWALL MailSuite (v1.4.00 – 2.4.26). Remote code execution possible. Restrict network access & monitor pop3wallpasswd. Patch pending. https://radar.offseq.com/threat/cve-2026-32661-stack-based-buffer-overflow-in-cano-fe8551b1 #OffSeq #CVE202632661 #infosec #vuln
View original postRelated Resources
Details
- CVE ID
- CVE-2026-32661
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- buffer_overflow
- Status
- rejected
- EPSS
- 13.6%
- Social Posts
- 1
CWE
- CWE-121
CVSS Metrics
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H