Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2250: CWE-284 Improper Access Control in METIS Cyberspace Technology SA METIS WIC

0
High
VulnerabilityCVE-2026-2250cvecve-2026-2250cwe-284cwe-215
Published: Wed Feb 11 2026 (02/11/2026, 14:13:45 UTC)
Source: CVE Database V5
Vendor/Project: METIS Cyberspace Technology SA
Product: METIS WIC

Description

The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.

AI-Powered Analysis

AILast updated: 02/11/2026, 14:45:39 UTC

Technical Analysis

CVE-2026-2250 identifies a critical security flaw in the METIS WIC product by METIS Cyberspace Technology SA, specifically affecting version oscore 2.1.234-r18. The vulnerability arises from the /dbviewer/ web endpoint being exposed without any authentication mechanism, allowing any remote attacker to access and export the internal telemetry SQLite database. This database contains sensitive operational data that could reveal internal system states or configurations. Compounding this issue, the application is configured with debug mode enabled, which causes malformed HTTP requests to trigger verbose Django framework tracebacks. These tracebacks disclose backend source code snippets, local file system paths, and system configuration details, providing attackers with valuable intelligence to facilitate further attacks or exploitation. The root cause is improper access control (CWE-284) and sensitive information exposure (CWE-215). The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, making it highly accessible to attackers. Although no active exploits are currently known, the combination of unauthenticated data access and detailed error disclosures significantly raises the risk profile. The CVSS 3.1 score of 7.5 reflects a high severity rating, primarily due to the high confidentiality impact and ease of exploitation. The vulnerability affects operational telemetry data confidentiality but does not directly impact integrity or availability. Organizations deploying METIS WIC devices should urgently review their exposure of the /dbviewer/ endpoint, disable debug mode in production, and apply any available patches or mitigations once released.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive operational telemetry data collected by METIS WIC devices. Exposure of this data could lead to leakage of internal system states, operational metrics, or network configurations, which attackers could leverage for reconnaissance or to craft targeted attacks. The disclosure of backend source code and system paths via debug tracebacks further aids attackers in understanding the internal workings of the application, increasing the likelihood of successful exploitation of other vulnerabilities or unauthorized access. While the vulnerability does not directly affect system integrity or availability, the loss of confidentiality can have serious consequences, including regulatory non-compliance under GDPR if personal or sensitive data is indirectly exposed. Additionally, operational disruptions could occur if attackers use the disclosed information to escalate privileges or pivot within the network. Given the remote, unauthenticated nature of the exploit, the threat surface is broad, especially for organizations with internet-facing METIS WIC devices. This could impact critical infrastructure sectors in Europe that rely on METIS WIC for telemetry and operational monitoring, potentially undermining operational security and trust.

Mitigation Recommendations

European organizations should immediately audit their METIS WIC deployments to identify any instances running version oscore 2.1.234-r18 or other vulnerable versions. The following specific mitigations are recommended: 1) Restrict access to the /dbviewer/ endpoint by implementing strong authentication controls and network segmentation to limit exposure only to trusted internal users. 2) Disable debug mode in all production environments to prevent verbose error messages and traceback disclosures. 3) Monitor network traffic for unusual access attempts to the /dbviewer/ endpoint and implement intrusion detection rules to alert on suspicious activity. 4) If possible, apply vendor patches or updates as soon as they become available; if no patches exist yet, consider temporary compensating controls such as web application firewalls (WAFs) to block unauthorized access. 5) Conduct a thorough review of telemetry data stored in the SQLite database to assess sensitivity and consider encrypting or anonymizing data where feasible. 6) Educate IT and security teams about the risks of exposing debug information and enforce secure development and deployment practices. 7) Regularly review and update access control policies to ensure endpoints are not inadvertently exposed without authentication.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MHV
Date Reserved
2026-02-09T13:38:44.756Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698c92b44b57a58fa19c028a

Added to database: 2/11/2026, 2:31:16 PM

Last enriched: 2/11/2026, 2:45:39 PM

Last updated: 2/11/2026, 5:59:08 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats