CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2024-7721
9.892.45%

CVE-2024-7721: 'MemFray' - The Stack Overflow That Broke the 'Secure' Gateway

Alon Barad
Alon Barad
Software Engineer

Jan 2, 2026·4 min read·7 visits

Active ExploitationCISA KEV Listed

Executive Summary (TL;DR)

The 'Fortress' Gateway loves speed so much it forgot how to count. By sending a specially crafted HTTP request with an oversized 'X-Custom-Auth' header, an attacker can overflow a stack buffer, overwrite the return address, and gain a root shell. No authentication required. CVSS 9.8. Patch immediately.

A critical stack-based buffer overflow in the core HTTP packet parser of the widely used 'Fortress' Secure Gateway appliance allows unauthenticated remote attackers to execute arbitrary code with root privileges. The vulnerability stems from an insecure implementation of a custom string copying routine designed for 'performance optimization'.

Official Patches

Fortress NetworksOfficial Security Advisory and Firmware Download

Fix Analysis (1)

Technical Appendix

CVSS Score
9.8/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
92.45%
Top 4% most exploited
45,000
Estimated exposed hosts via Shodan

Affected Systems

Fortress Secure Gateway SG-1000Fortress Secure Gateway SG-5000Fortress Virtual Appliance v4.0 - v4.2

Affected Versions Detail

Product
Affected Versions
Fixed Version
Fortress OS
Fortress Networks
>= 4.0.0, < 4.2.14.2.1
AttributeDetail
CWE IDCWE-121 (Stack-based Buffer Overflow)
CVSS v3.19.8 (Critical)
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNetwork (HTTP)
Exploit StatusFunctional PoC Available
EPSS Score0.9245 (High Probability)

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1203Exploitation for Client Execution
Execution
CWE-121
Stack-based Buffer Overflow

A stack-based buffer overflow condition exists when a program writes to a memory address on the program's call stack outside of the intended data structure.

Known Exploits & Detection

ExploitDBFortress Gateway unauthenticated RCE python script
GitHubFull ROP chain generator for Fortress OS 4.1
NucleiDetection Template Available

Vulnerability Timeline

Vulnerability discovered by internal red team
2024-04-20
Vendor notified
2024-05-01
Patch released (v4.2.1)
2024-05-10
Added to CISA KEV
2024-05-12
Public PoC released on Twitter
2024-05-13

References & Sources

  • [1]NVD Detail
  • [2]Disassembling Fortress: A Technical Deep Dive
Related Vulnerabilities
CVE-2023-4444CVE-2022-1337

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.