Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2250: CWE-284 Improper Access Control in METIS Cyberspace Technology SA METIS WIC

0
High
VulnerabilityCVE-2026-2250cvecve-2026-2250cwe-284cwe-215
Published: Wed Feb 11 2026 (02/11/2026, 14:13:45 UTC)
Source: CVE Database V5
Vendor/Project: METIS Cyberspace Technology SA
Product: METIS WIC

Description

The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 15:01:11 UTC

Technical Analysis

CVE-2026-2250 is a vulnerability in the METIS WIC product by METIS Cyberspace Technology SA, specifically in version oscore 2.1.234-r18. The issue stems from the /dbviewer/ web endpoint being exposed without any authentication mechanism, allowing any remote attacker to access and export the internal telemetry SQLite database. This database contains sensitive operational data that could reveal system behavior and configurations. Compounding this, the application is configured with debug mode enabled, which causes malformed HTTP requests to trigger verbose Django framework tracebacks. These tracebacks disclose critical backend information including source code snippets, local file paths, and system configuration details, which can aid attackers in crafting more targeted attacks or escalating privileges. The vulnerability is classified under CWE-284 (Improper Access Control) and CWE-215 (Information Exposure Through Debug Information). The CVSS v3.1 base score is 7.5, reflecting a high severity due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (C:H) but no impact on integrity or availability. Although no exploits have been reported in the wild yet, the exposure of sensitive data and debug information presents a significant risk. The vulnerability was published on February 11, 2026, and no patches are currently linked, indicating that organizations must implement interim mitigations. The affected product is likely used in environments requiring telemetry and operational monitoring, such as telecommunications or critical infrastructure sectors.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality of operational data, which could include sensitive telemetry and system behavior information. Exposure of such data can facilitate espionage, competitive intelligence gathering, or preparation for more damaging attacks. The debug mode information disclosure further increases risk by revealing backend source code and system details, potentially enabling attackers to identify additional vulnerabilities or misconfigurations. Organizations relying on METIS WIC devices in critical sectors like telecommunications, energy, or government infrastructure could face operational risks if attackers leverage this vulnerability for reconnaissance or lateral movement. The lack of authentication means attackers can exploit this remotely without credentials, increasing the attack surface. Although integrity and availability are not directly impacted, the confidentiality breach alone can have severe regulatory and reputational consequences under European data protection laws such as GDPR. Additionally, the exposure of internal system details may lead to targeted attacks against European networks using these devices.

Mitigation Recommendations

1. Immediately disable debug mode in the METIS WIC application configuration to prevent verbose error messages and traceback disclosures. 2. Restrict access to the /dbviewer/ endpoint by implementing strong authentication mechanisms, such as multi-factor authentication or integration with enterprise identity providers. 3. Use network segmentation and firewall rules to limit access to the management interfaces of METIS WIC devices only to trusted administrative networks. 4. Monitor network traffic and logs for any unauthorized access attempts to the /dbviewer/ endpoint or unusual export activity of telemetry data. 5. Engage with METIS Cyberspace Technology SA to obtain patches or updates addressing this vulnerability and apply them promptly once available. 6. Conduct a thorough security review of all METIS WIC deployments to identify any other misconfigurations or exposure risks. 7. Implement intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 8. Educate operational and security teams about the risks of running production systems in debug mode and enforce secure configuration baselines.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MHV
Date Reserved
2026-02-09T13:38:44.756Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698c92b44b57a58fa19c028a

Added to database: 2/11/2026, 2:31:16 PM

Last enriched: 2/18/2026, 3:01:11 PM

Last updated: 3/31/2026, 2:44:17 PM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses