Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0789: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in ALGO 8180 IP Audio Alerter

0
Medium
VulnerabilityCVE-2026-0789cvecve-2026-0789cwe-200
Published: Fri Jan 23 2026 (01/23/2026, 03:01:16 UTC)
Source: CVE Database V5
Vendor/Project: ALGO
Product: 8180 IP Audio Alerter

Description

CVE-2026-0789 is a medium severity vulnerability affecting ALGO 8180 IP Audio Alerter devices, specifically version 5. 5. It involves the exposure of sensitive authentication cookie information within the web UI response body, allowing remote attackers to access sensitive data without authentication or user interaction. The flaw stems from improper handling of sensitive information in the device's web interface. While it does not allow direct control or disruption of the device, the disclosed information could facilitate further attacks. No known exploits are currently reported in the wild. European organizations using these devices should be aware of this information disclosure risk and apply mitigations promptly.

AI-Powered Analysis

AILast updated: 01/30/2026, 10:07:07 UTC

Technical Analysis

CVE-2026-0789 is a vulnerability categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the ALGO 8180 IP Audio Alerter, specifically version 5.5. The vulnerability arises from the device's web-based user interface improperly including an authentication cookie within the HTTP response body. This flaw allows remote attackers to retrieve sensitive authentication tokens without requiring any authentication or user interaction, thereby exposing sensitive information that should remain confidential. The vulnerability is network exploitable (AV:N), requires low attack complexity (AC:L), and no privileges or user interaction (PR:N/UI:N) are needed, making it relatively easy to exploit. However, the impact is limited to confidentiality (C:L) without affecting integrity or availability. The vulnerability was identified and assigned by the Zero Day Initiative (ZDI) as ZDI-CAN-28297 and published on January 23, 2026. No patches or known exploits are currently available, but the exposure of authentication cookies could enable attackers to impersonate legitimate users or gain further access to device functions if combined with other vulnerabilities or misconfigurations.

Potential Impact

For European organizations deploying ALGO 8180 IP Audio Alerter devices, this vulnerability poses a risk of unauthorized disclosure of sensitive authentication information. While it does not directly allow device control or denial of service, the exposure of authentication cookies can facilitate lateral movement, unauthorized access, or reconnaissance within the network. Organizations relying on these devices for critical audio alerting, such as in public safety, transportation hubs, or corporate environments, could face increased risk of targeted attacks if attackers leverage this information to escalate privileges or compromise device integrity indirectly. The lack of authentication requirement increases the attack surface, especially for devices accessible from less protected network segments. This could lead to breaches of confidentiality and potential compliance issues under European data protection regulations if sensitive information is exposed or misused.

Mitigation Recommendations

Given the absence of an official patch at this time, European organizations should implement compensating controls to mitigate risk. These include restricting network access to the ALGO 8180 IP Audio Alerter web interface via firewall rules or network segmentation, ensuring the device is not exposed to untrusted networks or the internet. Employing strong network-level authentication and VPNs for remote access can reduce unauthorized exposure. Monitoring network traffic for unusual requests to the device's web interface may help detect exploitation attempts. Organizations should also engage with ALGO for timely updates or patches and plan for prompt deployment once available. Additionally, reviewing and hardening device configurations to minimize sensitive data exposure and disabling unnecessary web UI features can reduce attack vectors. Regular security assessments and penetration testing focused on these devices can identify residual risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2026-01-08T22:55:36.577Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6972e91b4623b1157cde334a

Added to database: 1/23/2026, 3:20:59 AM

Last enriched: 1/30/2026, 10:07:07 AM

Last updated: 2/6/2026, 9:49:03 PM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats