Intrusion Prevention



This indicates an attack attempt to exploit a Buffer Overflow vulnerability in WebGate Embedded Standard Protocol SDK.
The vulnerability, which is located in the "WESPMonitor" ActiveX control, can be exploited through misuse of a vulnerable method. An attacker can exploit this by tricking an unsuspecting user into visiting a malicious webpage and execute arbitrary code within the context of the application.

Affected Products

WebGate Embedded Standard Protocol (WESP) SDK


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Currently we are unaware of any vendor supplied patch or updates available for this issue.

CVE References