Home

Description

Stack-based buffer overflow vulnerability exists in GUARDIANWALL MailSuite and GUARDIANWALL Mail Security Cloud (SaaS version). If a remote attacker sends a specially crafted request to the product's web service, arbitrary code may be executed when the product is configured to run pop3wallpasswd with grdnwww user privilege.

PUBLISHED Reserved 2026-05-11 | Published 2026-05-13 | Updated 2026-05-13 | Assigner jpcert




CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

Stack-based buffer overflow

Product status

Ver 1.4.00 to Ver 2.4.26
affected

versions before the maintenance on April 30
affected

2026
affected

References

security-support.canon-its.jp/...04?site_domain=GUARDIANWALL

jvn.jp/en/jp/JVN35567473/

cve.org (CVE-2026-32661)

nvd.nist.gov (CVE-2026-32661)

Download JSON