Cyber Posture

CVE-2020-37212

HighPublic PoC

Published: 11 February 2026

Published
11 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0004 14.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-37212 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Nsasoft Spotmsn. Its CVSS base score is 7.5 (High).

Operationally, ranked at the 14.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-120

Platform-independent managed code eliminates the need for unchecked native buffer copies that are the root cause of classic buffer overflows.

NVD Description

SpotMSN 2.4.6 contains a denial of service vulnerability in the registration name input field that allows attackers to crash the application. Attackers can generate a 1000-character payload and paste it into the 'Name' field to trigger an application crash.

Deeper analysisAI

CVE-2020-37212 is a denial of service vulnerability in SpotMSN version 2.4.6. The flaw occurs in the registration name input field, where attackers can paste a 1000-character payload into the 'Name' field to trigger an application crash. It is associated with CWE-120 (Buffer Copy without Checking Size of Input) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high availability impact with low complexity and no privileges required.

Unauthenticated attackers with network access can exploit this vulnerability by supplying the oversized payload during the registration process, causing the SpotMSN application to crash and resulting in a denial of service. The attack requires no user interaction beyond the input and has no effects on confidentiality or integrity.

Advisories and references, including those from VulnCheck detailing the SpotMSN name denial of service, an Exploit-DB entry (47869) with a proof-of-concept, and NSAuditor, document the issue but do not specify patches or mitigations in the available information.

Details

CWE(s)

Affected Products

nsasoft
spotmsn
≤ 2.4.6

CVEs Like This One

CVE-2020-37207Same vendor: Nsasoft
CVE-2020-37130Same vendor: Nsasoft
CVE-2021-47814Same vendor: Nsasoft
CVE-2020-37201Same vendor: Nsasoft
CVE-2020-37206Same vendor: Nsasoft
CVE-2020-37199Same vendor: Nsasoft
CVE-2020-37211Same vendor: Nsasoft
CVE-2020-37196Same vendor: Nsasoft
CVE-2021-47815Same vendor: Nsasoft
CVE-2020-37204Same vendor: Nsasoft

References