ncp-e CVE Vulnerabilities & Metrics

Focus on ncp-e vulnerabilities and metrics.

Last updated: 16 Jan 2026, 23:25 UTC

About ncp-e Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with ncp-e. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total ncp-e CVEs: 8
Earliest CVE date: 06 Sep 2012, 10:41 UTC
Latest CVE date: 26 Nov 2025, 19:15 UTC

Latest CVE reference: CVE-2025-26155

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -100.0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): -100.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical ncp-e CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.31

Max CVSS: 9.3

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 6
4.0-6.9 2
7.0-8.9 0
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS ncp-e CVEs

These are the five CVEs with the highest CVSS scores for ncp-e, sorted by severity first and recency.

All CVEs for ncp-e

CVE-2025-26155 ncp-e vulnerability CVSS: 0 26 Nov 2025, 19:15 UTC

NCP Secure Enterprise Client 13.18 and NCP Secure Entry Windows Client 13.19 have an Untrusted Search Path vulnerability.

CVE-2023-28872 ncp-e vulnerability CVSS: 0 25 Dec 2023, 07:15 UTC

Support Assistant in NCP Secure Enterprise Client before 13.10 allows attackers to execute DLL files with SYSTEM privileges by creating a symbolic link from a %LOCALAPPDATA%\Temp\NcpSupport* location.

CVE-2023-28871 ncp-e vulnerability CVSS: 0 09 Dec 2023, 07:15 UTC

Support Assistant in NCP Secure Enterprise Client before 12.22 allows attackers to read registry information of the operating system by creating a symbolic link.

CVE-2023-28870 ncp-e vulnerability CVSS: 0 09 Dec 2023, 07:15 UTC

Insecure File Permissions in Support Assistant in NCP Secure Enterprise Client before 12.22 allow attackers to write to configuration files from low-privileged user accounts.

CVE-2023-28869 ncp-e vulnerability CVSS: 0 09 Dec 2023, 07:15 UTC

Support Assistant in NCP Secure Enterprise Client before 12.22 allows attackers read the contents of arbitrary files on the operating system by creating a symbolic link.

CVE-2023-28868 ncp-e vulnerability CVSS: 0 09 Dec 2023, 07:15 UTC

Support Assistant in NCP Secure Enterprise Client before 12.22 allows attackers to delete arbitrary files on the operating system by creating a symbolic link.

CVE-2020-11474 ncp-e vulnerability CVSS: 4.6 28 Jul 2020, 21:15 UTC

NCP Secure Enterprise Client before 10.15 r47589 allows a symbolic link attack on enumusb.reg via Support Assistant.

CVE-2017-17023 ncp-e vulnerability CVSS: 9.3 09 Apr 2019, 18:29 UTC

The Sophos UTM VPN endpoint interacts with client software provided by NPC Engineering (www.ncp-e.com). The affected client software, "Sophos IPSec Client" 11.04 is a rebranded version of NCP "Secure Entry Client" 10.11 r32792. A vulnerability in the software update feature of the VPN client allows a man-in-the-middle (MITM) or man-on-the-side (MOTS) attacker to execute arbitrary, malicious software on a target user's computer. This is related to SIC_V11.04-64.exe (Sophos), NCP_EntryCl_Windows_x86_1004_31799.exe (NCP), and ncpmon.exe (both Sophos and NCP). The vulnerability exists because: (1) the VPN client requests update metadata over an insecure HTTP connection; and (2) the client software does not check if the software update is signed before running it.

CVE-2010-5203 ncp-e vulnerability CVSS: 6.9 06 Sep 2012, 10:41 UTC

Multiple untrusted search path vulnerabilities in NCP Secure Enterprise Client before 9.21 Build 68, Secure Entry Client before 9.23 Build 18, and Secure Client - Juniper Edition before 9.23 Build 18 allow local users to gain privileges via a Trojan horse (1) dvccsabase002.dll, (2) conman.dll, (3) kmpapi32.dll, or (4) ncpmon2.dll file in the current working directory, as demonstrated by a directory that contains a .pcf or .spd file. NOTE: some of these details are obtained from third party information.