CVE-2024-7721

CVE-2024-7721: 'MemFray' - The Stack Overflow That Broke the 'Secure' Gateway

Alon Barad
Alon Barad
Software Engineer

Jan 2, 2026·4 min read·4 visits

Executive Summary (TL;DR)

The 'Fortress' Gateway loves speed so much it forgot how to count. By sending a specially crafted HTTP request with an oversized 'X-Custom-Auth' header, an attacker can overflow a stack buffer, overwrite the return address, and gain a root shell. No authentication required. CVSS 9.8. Patch immediately.

A critical stack-based buffer overflow in the core HTTP packet parser of the widely used 'Fortress' Secure Gateway appliance allows unauthenticated remote attackers to execute arbitrary code with root privileges. The vulnerability stems from an insecure implementation of a custom string copying routine designed for 'performance optimization'.

Fix Analysis (1)

Technical Appendix

CVSS Score
9.8/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
92.45%
Top 4% most exploited
45,000
via Shodan

Affected Systems

Fortress Secure Gateway SG-1000Fortress Secure Gateway SG-5000Fortress Virtual Appliance v4.0 - v4.2

Affected Versions Detail

Product
Affected Versions
Fixed Version
Fortress OS
Fortress Networks
>= 4.0.0, < 4.2.14.2.1
AttributeDetail
CWE IDCWE-121 (Stack-based Buffer Overflow)
CVSS v3.19.8 (Critical)
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNetwork (HTTP)
Exploit StatusFunctional PoC Available
EPSS Score0.9245 (High Probability)
CWE-121
Stack-based Buffer Overflow

A stack-based buffer overflow condition exists when a program writes to a memory address on the program's call stack outside of the intended data structure.

Vulnerability Timeline

Vulnerability discovered by internal red team
2024-04-20
Vendor notified
2024-05-01
Patch released (v4.2.1)
2024-05-10
Added to CISA KEV
2024-05-12
Public PoC released on Twitter
2024-05-13