Cyber Posture

CVE-2020-37042

HighPublic PoC

Published: 30 January 2026

Published
30 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 0.6th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-37042 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability. Its CVSS base score is 8.4 (High).

Operationally, ranked at the 0.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of computer name inputs to prevent buffer overflows from malicious payloads in the 'Find Computer' feature.

prevent

Implements memory protections like ASLR and DEP to mitigate arbitrary code execution from buffer overflow exploits.

prevent

Mandates timely remediation of the specific buffer overflow flaw in Frigate Professional 3.36.0.9 via patching or upgrades.

NVD Description

Frigate Professional 3.36.0.9 contains a local buffer overflow vulnerability in the 'Find Computer' feature that allows attackers to execute arbitrary code by overflowing the computer name input field. Attackers can craft a malicious payload that triggers a buffer overflow, enabling…

more

code execution and launching calculator as a proof of concept.

Deeper analysisAI

CVE-2020-37042 is a local buffer overflow vulnerability (CWE-120) affecting Frigate Professional version 3.36.0.9, specifically in the 'Find Computer' feature. The flaw occurs when attackers overflow the computer name input field with a malicious payload, triggering a buffer overflow that enables arbitrary code execution. A proof-of-concept demonstrates this by launching the calculator application.

The vulnerability has a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity with local attack vector, low complexity, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. Local attackers can exploit it to execute arbitrary code on the affected system, potentially leading to full compromise without authentication.

Advisories and resources, including the VulnCheck advisory at https://www.vulncheck.com/advisories/frigate-professional-find-computer-local-buffer-overflow and an Exploit-DB entry at https://www.exploit-db.com/exploits/48579, document the issue and proof-of-concept exploit. The archived Frigate website at https://web.archive.org/web/20190623044943/http://www.frigate3.com/index.php provides additional context on the software.

An exploit is publicly available on Exploit-DB, confirming practical exploitation feasibility for local attackers.

Details

CWE(s)

CVEs Like This One

CVE-2025-24956Shared CWE-120
CVE-2024-57482Shared CWE-120
CVE-2024-57479Shared CWE-120
CVE-2025-69807Shared CWE-120
CVE-2019-25353Shared CWE-120
CVE-2020-37050Shared CWE-120
CVE-2020-37207Shared CWE-120
CVE-2025-50670Shared CWE-120
CVE-2024-53027Shared CWE-120
CVE-2024-57509Shared CWE-120

References