Cyber Posture

CVE-2020-37211

HighPublic PoC

Published: 11 February 2026

Published
11 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0004 14.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-37211 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Nsasoft Spotim. Its CVSS base score is 7.5 (High).

Operationally, ranked at the 14.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-120

Platform-independent managed code eliminates the need for unchecked native buffer copies that are the root cause of classic buffer overflows.

NVD Description

SpotIM 2.2 contains a denial of service vulnerability that allows attackers to crash the application by inputting a large buffer in the registration name field. Attackers can generate a 1000-character payload and paste it into the 'Name' field to trigger…

more

an application crash.

Deeper analysisAI

CVE-2020-37211 is a denial-of-service vulnerability in SpotIM version 2.2, stemming from a buffer overflow condition (CWE-120) in the registration name field. Attackers can crash the application by submitting a large buffer, such as a 1000-character payload, into the 'Name' field during registration. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), highlighting its potential for high availability impact without compromising confidentiality or integrity.

Any remote attacker can exploit this vulnerability over the network with low attack complexity, no required privileges, and no user interaction. Successful exploitation results in an application crash, denying service to legitimate users of the affected SpotIM instance.

Advisories and proof-of-concept exploits are documented in references such as NSAuditor, Exploit-DB (exploit 47870), and VulnCheck, which detail the denial-of-service triggered by oversized input in the SpotIM name field. No specific patch or mitigation details are outlined in the provided CVE information.

Details

CWE(s)

Affected Products

nsasoft
spotim
≤ 2.2

CVEs Like This One

CVE-2020-37207Same vendor: Nsasoft
CVE-2020-37130Same vendor: Nsasoft
CVE-2020-37212Same vendor: Nsasoft
CVE-2021-47814Same vendor: Nsasoft
CVE-2020-37201Same vendor: Nsasoft
CVE-2020-37206Same vendor: Nsasoft
CVE-2020-37199Same vendor: Nsasoft
CVE-2020-37196Same vendor: Nsasoft
CVE-2021-47815Same vendor: Nsasoft
CVE-2020-37204Same vendor: Nsasoft

References