Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0873: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ercom Cryptobox

0
Medium
VulnerabilityCVE-2026-0873cvecve-2026-0873cwe-79cwe-1220
Published: Wed Feb 04 2026 (02/04/2026, 10:42:14 UTC)
Source: CVE Database V5
Vendor/Project: Ercom
Product: Cryptobox

Description

On a Cryptobox platform where administrator segregation based on entities is used, some vulnerabilities in Ercom Cryptobox administration console allows an authenticated entity administrator with knowledge to elevate his account to global administrator.

AI-Powered Analysis

AILast updated: 02/04/2026, 15:29:29 UTC

Technical Analysis

CVE-2026-0873 is a vulnerability classified under CWE-79 (Improper Neutralization of Input During Web Page Generation, commonly known as Cross-site Scripting) and CWE-1220, affecting the Ercom Cryptobox administration console. The issue arises in environments where administrator segregation is implemented based on entities, a feature designed to limit administrative privileges to specific organizational units. Due to improper input sanitization and validation in the web interface, an authenticated entity administrator can exploit this flaw to escalate privileges to a global administrator level. This escalation bypasses intended access controls, potentially granting full administrative rights across the Cryptobox platform. The vulnerability has a CVSS 4.0 base score of 4.8, indicating medium severity, with attack vector being network-based and no user interaction required. The attack complexity is low, and no additional authentication beyond the entity administrator account is needed. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized access and control over sensitive cryptographic and communication management functions. No patches or exploits are currently publicly available, but the risk remains significant for targeted attacks.

Potential Impact

For European organizations, especially those in government, defense, telecommunications, and critical infrastructure sectors that utilize Ercom Cryptobox for secure communications, this vulnerability could lead to unauthorized administrative access. Such access could compromise sensitive cryptographic keys, disrupt secure communications, or allow malicious configuration changes. The breach of administrative segregation undermines organizational security policies and could facilitate lateral movement within networks. Given the medium severity, the impact is substantial but requires an attacker to have authenticated entity administrator credentials, limiting the attack surface. However, insider threats or compromised entity administrator accounts could exploit this vulnerability to escalate privileges and cause significant damage. The confidentiality of communications and integrity of administrative controls are at risk, potentially affecting compliance with European data protection regulations such as GDPR.

Mitigation Recommendations

To mitigate CVE-2026-0873, European organizations should implement the following specific measures: 1) Apply any available patches or updates from Ercom promptly once released. 2) Enforce strict input validation and sanitization on all administrative web interfaces to prevent injection of malicious scripts. 3) Review and tighten access controls to minimize the number of entity administrators and enforce the principle of least privilege. 4) Implement multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 5) Monitor administrative activities and logs for unusual privilege escalations or access patterns. 6) Conduct regular security audits and penetration testing focused on administrative segregation and web interface vulnerabilities. 7) Educate administrators about phishing and social engineering risks that could lead to credential theft. 8) Consider network segmentation to isolate administrative consoles from general user networks. These steps go beyond generic advice by focusing on the specific context of entity-based administrative segregation and web interface input handling.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
THA-PSIRT
Date Reserved
2026-01-13T09:32:07.338Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6983627ef9fa50a62f94fb99

Added to database: 2/4/2026, 3:15:10 PM

Last enriched: 2/4/2026, 3:29:29 PM

Last updated: 2/6/2026, 4:06:25 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats