Stack-based buffer overflow vulnerability exists in GUARDIANWALL MailSuite and GUARDIANWALL Mail Security Cloud (SaaS version). If a remote attacker sends a specially crafted request to the product's web service, arbitrary code may be executed when the product is configured to run pop3wallpasswd with grdnwww user privilege.

Project Subscriptions

Vendors Products
Canon Marketing Japan Subscribe
Guardianwall Mail Security Cloud (saas Version) Subscribe
Guardianwall Mailsuite (on-premises Version) Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 13 May 2026 11:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 May 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Canon Marketing Japan
Canon Marketing Japan guardianwall Mail Security Cloud (saas Version)
Canon Marketing Japan guardianwall Mailsuite (on-premises Version)
Vendors & Products Canon Marketing Japan
Canon Marketing Japan guardianwall Mail Security Cloud (saas Version)
Canon Marketing Japan guardianwall Mailsuite (on-premises Version)

Wed, 13 May 2026 08:15:00 +0000


Wed, 13 May 2026 07:30:00 +0000

Type Values Removed Values Added
Title Stack Buffer Overflow in GUARDIANWALL MailSuite Web Service Enables Remote Code Execution

Wed, 13 May 2026 06:00:00 +0000

Type Values Removed Values Added
Description Stack-based buffer overflow vulnerability exists in GUARDIANWALL MailSuite and GUARDIANWALL Mail Security Cloud (SaaS version). If a remote attacker sends a specially crafted request to the product's web service, arbitrary code may be executed when the product is configured to run pop3wallpasswd with grdnwww user privilege.
Weaknesses CWE-121
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-05-13T10:49:48.622Z

Reserved: 2026-05-11T00:11:34.095Z

Link: CVE-2026-32661

cve-icon Vulnrichment

Updated: 2026-05-13T10:48:17.002Z

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T10:34:50Z

Weaknesses