MEDIUMCVE-2019-25666CVSS 6.2

CVE-2019-25666: SpotAuditor Buffer Overflow (3.6.7)

Platform

c

Component

spotauditor

Fixed in

3.6.8

AI Confidence: highNVDEPSS 0.0%Reviewed: Apr 2026

CVE-2019-25666 is a local buffer overflow vulnerability discovered in SpotAuditor. This flaw allows an attacker to crash the application by providing an oversized Base64 string to the Base64 Password Decoder component, resulting in a denial of service. The vulnerability affects SpotAuditor version 3.6.7. No official patch has been released to address this issue.

Impact and Attack Scenarios

CVE-2019-25666 affects SpotAuditor version 3.6.7, presenting a local buffer overflow vulnerability in its Base64 Password Decoder component. This flaw allows a local attacker to crash the application, resulting in a denial-of-service (DoS) condition. The issue stems from how SpotAuditor handles incoming Base64 strings, allowing an oversized string to overwrite allocated memory, causing the program to terminate. The severity of this vulnerability is rated as CVSS 6.2, indicating a moderate risk. As there is no fix available, mitigation focuses on limiting local access to the system where SpotAuditor runs.

Exploitation Context

Exploitation of CVE-2019-25666 requires local access to the system running SpotAuditor 3.6.7. An attacker could leverage this vulnerability by providing an excessively long Base64 string through the password decoding interface. This string, when processed by the vulnerable component, triggers a buffer overflow, leading to application failure. The attacker does not need elevated privileges to exploit this vulnerability, provided they have local access. The ease of exploitation is relatively low, as it requires crafting and submitting a malicious Base64 string, but the impact is significant, resulting in a denial of service.

Threat Intelligence

Exploit Status

Proof of ConceptUnknown
CISA KEVNO
Internet ExposureLow

EPSS

0.01% (3% percentile)

CISA SSVC

Exploitationpoc
Automatableno
Technical Impactpartial

CVSS Vector

THREAT INTELLIGENCE· CVSS 3.1CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H6.2MEDIUMAttack VectorLocalHow the attacker reaches the targetAttack ComplexityLowConditions required to exploitPrivileges RequiredNoneAuthentication level needed to attackUser InteractionNoneWhether a victim must take actionScopeUnchangedImpact beyond the vulnerable componentConfidentialityNoneRisk of sensitive data exposureIntegrityNoneRisk of unauthorized data modificationAvailabilityHighRisk of service disruptionnextguardhq.com · CVSS v3.1 Base Score
What do these metrics mean?
Attack Vector
Local — attacker needs a local shell or interactive session on the system.
Attack Complexity
Low — no special conditions required. Attacker can exploit reliably without depending on rare configurations or timing.
Privileges Required
None — unauthenticated. No login or credentials needed to exploit.
User Interaction
None — attack is automatic and silent. Victim does nothing: no click, no file open.
Scope
Unchanged — impact is limited to the vulnerable component itself.
Confidentiality
None — no confidentiality impact. Attacker cannot read protected data.
Integrity
None — no integrity impact. Attacker cannot modify data.
Availability
High — complete crash or resource exhaustion. Full denial of service.

Affected Software

Componentspotauditor
VendorNsauditor
Affected rangeFixed in
3.6.7 – 3.6.73.6.8

Weakness Classification (CWE)

Timeline

  1. Reserved
  2. Published
  3. Modified
  4. EPSS updated
Unpatched — 49 days since disclosure

Mitigation and Workarounds

Due to the absence of an official fix for CVE-2019-25666 in SpotAuditor 3.6.7, the primary mitigation is based on perimeter and access security measures. It is strongly recommended to restrict local access to the system where SpotAuditor is executed. Implementing strict access controls, such as multi-factor authentication and the principle of least privilege, can help prevent local attackers from exploiting this vulnerability. Monitoring system activity for anomalous behavior is also crucial. Considering an upgrade to a newer version of SpotAuditor, if available, is the most effective long-term solution, although a patched version is currently unavailable. Network segmentation can also limit the impact of a potential exploitation.

How to fix

Actualice SpotAuditor a una versión corregida que solucione la vulnerabilidad de desbordamiento de búfer en el componente de decodificación de contraseñas Base64. Consulte la documentación del proveedor o su sitio web para obtener información sobre las actualizaciones disponibles.

CVE Security Newsletter

Vulnerability analysis and critical alerts directly to your inbox.

Frequently asked questions

What is CVE-2019-25666 — Buffer Overflow in SpotAuditor?

A buffer overflow occurs when a program attempts to write data beyond the boundaries of an allocated memory buffer, overwriting adjacent data and potentially causing the program to crash.

Am I affected by CVE-2019-25666 in SpotAuditor?

'DoS' stands for 'Denial of Service'. It's an attack aimed at making a network service or resource unavailable to its legitimate users.

How do I fix CVE-2019-25666 in SpotAuditor?

Currently, there is no official fix provided by the SpotAuditor developer for CVE-2019-25666.

Is CVE-2019-25666 being actively exploited?

Restrict local access to the system, implement strict access controls, and monitor system activity for anomalous behavior.

Where can I find the official SpotAuditor advisory for CVE-2019-25666?

If you are using SpotAuditor 3.6.7, implement the mitigation measures described above and consider upgrading to a newer version if available.

Is your project affected?

Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.