Stack-based buffer overflow vulnerability exists in GUARDIANWALL MailSuite and GUARDIANWALL Mail Security Cloud (SaaS version). If a remote attacker sends a specially crafted request to the product's web service, arbitrary code may be executed when the product is configured to run pop3wallpasswd with grdnwww user privilege.
History

Wed, 13 May 2026 11:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 May 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Canon Marketing Japan
Canon Marketing Japan guardianwall Mail Security Cloud (saas Version)
Canon Marketing Japan guardianwall Mailsuite (on-premises Version)
Vendors & Products Canon Marketing Japan
Canon Marketing Japan guardianwall Mail Security Cloud (saas Version)
Canon Marketing Japan guardianwall Mailsuite (on-premises Version)

Wed, 13 May 2026 08:15:00 +0000


Wed, 13 May 2026 07:30:00 +0000

Type Values Removed Values Added
Title Stack Buffer Overflow in GUARDIANWALL MailSuite Web Service Enables Remote Code Execution

Wed, 13 May 2026 06:00:00 +0000

Type Values Removed Values Added
Description Stack-based buffer overflow vulnerability exists in GUARDIANWALL MailSuite and GUARDIANWALL Mail Security Cloud (SaaS version). If a remote attacker sends a specially crafted request to the product's web service, arbitrary code may be executed when the product is configured to run pop3wallpasswd with grdnwww user privilege.
Weaknesses CWE-121
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published: 2026-05-13T05:15:15.435Z

Updated: 2026-05-13T10:49:48.622Z

Reserved: 2026-05-11T00:11:34.095Z

Link: CVE-2026-32661

cve-icon Vulnrichment

Updated: 2026-05-13T10:48:17.002Z

cve-icon NVD

Status : Deferred

Published: 2026-05-13T06:16:14.253

Modified: 2026-05-13T15:47:10.327

Link: CVE-2026-32661

cve-icon Redhat

No data.