Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2249: CWE-306 Missing Authentication for Critical Function in METIS Cyberspace Technology SA METIS DFS

0
Critical
VulnerabilityCVE-2026-2249cvecve-2026-2249cwe-306cwe-287
Published: Wed Feb 11 2026 (02/11/2026, 14:16:19 UTC)
Source: CVE Database V5
Vendor/Project: METIS Cyberspace Technology SA
Product: METIS DFS

Description

METIS DFS devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with 'daemon' privileges. This results in the compromise of the software, granting unauthorized access to modify configuration, read and alter sensitive data, or disrupt services.

AI-Powered Analysis

AILast updated: 02/11/2026, 14:45:56 UTC

Technical Analysis

CVE-2026-2249 is a critical security vulnerability identified in METIS Cyberspace Technology SA's METIS DFS product, specifically affecting devices running oscore version 2.1.234-r18 or earlier. The vulnerability arises from a missing authentication mechanism on the web-based shell interface accessible via the /console endpoint. This endpoint allows remote attackers to execute arbitrary operating system commands with 'daemon' privileges without any authentication or user interaction. The lack of access control on this critical function (classified under CWE-306: Missing Authentication for Critical Function and CWE-287: Improper Authentication) means that any unauthenticated attacker with network access to the device can gain significant control over the system. The attacker can modify device configurations, read or alter sensitive data, and disrupt or disable services, leading to full compromise of the device and potentially the broader network environment. The vulnerability has been assigned a CVSS v3.1 base score of 9.8, reflecting its critical impact on confidentiality, integrity, and availability, combined with the ease of exploitation (network attack vector, no privileges or user interaction required). While no public exploits have been reported yet, the severity and straightforward exploitation path make it a prime target for attackers once exploit code becomes available. The vulnerability affects a widely deployed network storage and management product, increasing the risk to organizations relying on METIS DFS for critical infrastructure or data storage.

Potential Impact

For European organizations, the impact of CVE-2026-2249 is substantial. Organizations using METIS DFS devices are at risk of unauthorized remote command execution, which can lead to complete system compromise. This includes unauthorized access to sensitive data, alteration or deletion of critical configuration files, and disruption of storage services, potentially causing data loss or downtime. The compromise of these devices could also serve as a pivot point for lateral movement within enterprise networks, escalating the threat to broader IT infrastructure. Critical sectors such as finance, healthcare, government, and telecommunications that rely on METIS DFS for data storage and management could face severe operational and reputational damage. Additionally, the lack of authentication on a privileged interface increases the risk of automated exploitation by malware or ransomware campaigns targeting vulnerable devices. The threat is heightened by the fact that no user interaction or prior authentication is required, making it accessible to any attacker with network access to the device. This could lead to widespread exploitation if devices are exposed to untrusted networks or insufficiently segmented internal networks.

Mitigation Recommendations

European organizations should immediately identify all METIS DFS devices running oscore version 2.1.234-r18 or earlier within their networks. Since no official patches are currently available, organizations should implement the following mitigations: 1) Restrict network access to the /console endpoint by applying strict firewall rules or network segmentation to limit access only to trusted administrative hosts. 2) Employ network-level authentication or VPNs to control access to management interfaces. 3) Monitor network traffic for unusual access patterns or attempts to reach the /console endpoint. 4) Disable or block the /console endpoint if possible through device configuration or by applying web server access controls. 5) Engage with METIS Cyberspace Technology SA for updates on patches or firmware upgrades addressing this vulnerability and plan immediate deployment once available. 6) Conduct thorough audits of device logs and configurations to detect any signs of compromise. 7) Implement intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. These measures should be combined with broader security hygiene practices such as regular vulnerability scanning and asset inventory to ensure no vulnerable devices remain exposed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MHV
Date Reserved
2026-02-09T13:38:43.331Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698c92b44b57a58fa19c0287

Added to database: 2/11/2026, 2:31:16 PM

Last enriched: 2/11/2026, 2:45:56 PM

Last updated: 2/11/2026, 6:01:17 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats