Skip to content
Threat Feed
high advisory

Atomic Alarm Clock 6.3 Stack Overflow Vulnerability (CVE-2020-37221)

Atomic Alarm Clock 6.3 is vulnerable to a stack overflow, allowing local attackers to execute arbitrary code by supplying a malicious string to the display name textbox in the Time Zones Clock configuration (CVE-2020-37221).

Atomic Alarm Clock 6.3 is vulnerable to a stack overflow (CVE-2020-37221). A local attacker can exploit this vulnerability by crafting a malicious string and supplying it to the display name textbox in the Time Zones Clock configuration. Successful exploitation allows arbitrary code execution with the privileges of the application. The attacker leverages a structured exception handling (SEH) overwrite and encoded shellcode to bypass SafeSEH protections. This vulnerability was reported on May 13, 2026, and poses a risk to systems running the affected software, potentially leading to unauthorized access and control.

Attack Chain

  1. The attacker gains local access to a system with Atomic Alarm Clock 6.3 installed.
  2. The attacker opens the Atomic Alarm Clock application.
  3. The attacker navigates to the Time Zones Clock configuration.
  4. The attacker inputs a specially crafted, overly long string into the display name textbox. This string is designed to overflow the allocated buffer on the stack.
  5. The crafted string includes an SEH overwrite, redirecting exception handling to the attacker’s controlled memory space.
  6. The crafted string also contains encoded shellcode.
  7. When the application attempts to handle the overflow, the SEH overwrite triggers, transferring control to the attacker’s shellcode.
  8. The shellcode executes, allowing the attacker to perform arbitrary commands with application privileges.

Impact

Successful exploitation of this stack overflow vulnerability allows a local attacker to execute arbitrary code with the privileges of the Atomic Alarm Clock application. This can lead to complete compromise of the affected system, allowing the attacker to install malware, steal sensitive data, or perform other malicious activities. Due to the nature of the vulnerability, systems where Atomic Alarm Clock 6.3 is installed are at risk.

Recommendation

  • Monitor process creation events for suspicious processes launched by Atomic Alarm Clock, using the “Atomic Alarm Clock Suspicious Process Creation” Sigma rule.
  • Implement application whitelisting to restrict the execution of unauthorized applications.
  • Monitor for registry changes made by Atomic Alarm Clock, which could indicate malicious activity or persistence.
  • Upgrade to a patched version of Atomic Alarm Clock if available; otherwise, consider uninstalling the vulnerable software.

Detection coverage 2

Atomic Alarm Clock Suspicious Process Creation

high

Detects CVE-2020-37221 exploitation — Suspicious processes spawned by Atomic Alarm Clock indicating potential code execution

sigma tactics: execution techniques: T1059.001 sources: process_creation, windows

Atomic Alarm Clock Registry Modification

medium

Detects registry modifications by Atomic Alarm Clock that could indicate malicious activity

sigma tactics: persistence techniques: T1547.001 sources: registry_set, windows

Detection queries are available on the platform. Get full rules →