CVE-2026-2250: CWE-284 Improper Access Control in METIS Cyberspace Technology SA METIS WIC
The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.
AI Analysis
Technical Summary
CVE-2026-2250 identifies a critical security flaw in the METIS WIC product by METIS Cyberspace Technology SA, specifically affecting version oscore 2.1.234-r18. The vulnerability arises from the /dbviewer/ web endpoint being exposed without any authentication mechanism, allowing any remote attacker to access and export the internal telemetry SQLite database. This database contains sensitive operational data that could reveal internal system states or configurations. Compounding this issue, the application is configured with debug mode enabled, which causes malformed HTTP requests to trigger verbose Django framework tracebacks. These tracebacks disclose backend source code snippets, local file system paths, and system configuration details, providing attackers with valuable intelligence to facilitate further attacks or exploitation. The root cause is improper access control (CWE-284) and sensitive information exposure (CWE-215). The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, making it highly accessible to attackers. Although no active exploits are currently known, the combination of unauthenticated data access and detailed error disclosures significantly raises the risk profile. The CVSS 3.1 score of 7.5 reflects a high severity rating, primarily due to the high confidentiality impact and ease of exploitation. The vulnerability affects operational telemetry data confidentiality but does not directly impact integrity or availability. Organizations deploying METIS WIC devices should urgently review their exposure of the /dbviewer/ endpoint, disable debug mode in production, and apply any available patches or mitigations once released.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive operational telemetry data collected by METIS WIC devices. Exposure of this data could lead to leakage of internal system states, operational metrics, or network configurations, which attackers could leverage for reconnaissance or to craft targeted attacks. The disclosure of backend source code and system paths via debug tracebacks further aids attackers in understanding the internal workings of the application, increasing the likelihood of successful exploitation of other vulnerabilities or unauthorized access. While the vulnerability does not directly affect system integrity or availability, the loss of confidentiality can have serious consequences, including regulatory non-compliance under GDPR if personal or sensitive data is indirectly exposed. Additionally, operational disruptions could occur if attackers use the disclosed information to escalate privileges or pivot within the network. Given the remote, unauthenticated nature of the exploit, the threat surface is broad, especially for organizations with internet-facing METIS WIC devices. This could impact critical infrastructure sectors in Europe that rely on METIS WIC for telemetry and operational monitoring, potentially undermining operational security and trust.
Mitigation Recommendations
European organizations should immediately audit their METIS WIC deployments to identify any instances running version oscore 2.1.234-r18 or other vulnerable versions. The following specific mitigations are recommended: 1) Restrict access to the /dbviewer/ endpoint by implementing strong authentication controls and network segmentation to limit exposure only to trusted internal users. 2) Disable debug mode in all production environments to prevent verbose error messages and traceback disclosures. 3) Monitor network traffic for unusual access attempts to the /dbviewer/ endpoint and implement intrusion detection rules to alert on suspicious activity. 4) If possible, apply vendor patches or updates as soon as they become available; if no patches exist yet, consider temporary compensating controls such as web application firewalls (WAFs) to block unauthorized access. 5) Conduct a thorough review of telemetry data stored in the SQLite database to assess sensitivity and consider encrypting or anonymizing data where feasible. 6) Educate IT and security teams about the risks of exposing debug information and enforce secure development and deployment practices. 7) Regularly review and update access control policies to ensure endpoints are not inadvertently exposed without authentication.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Finland
CVE-2026-2250: CWE-284 Improper Access Control in METIS Cyberspace Technology SA METIS WIC
Description
The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.
AI-Powered Analysis
Technical Analysis
CVE-2026-2250 identifies a critical security flaw in the METIS WIC product by METIS Cyberspace Technology SA, specifically affecting version oscore 2.1.234-r18. The vulnerability arises from the /dbviewer/ web endpoint being exposed without any authentication mechanism, allowing any remote attacker to access and export the internal telemetry SQLite database. This database contains sensitive operational data that could reveal internal system states or configurations. Compounding this issue, the application is configured with debug mode enabled, which causes malformed HTTP requests to trigger verbose Django framework tracebacks. These tracebacks disclose backend source code snippets, local file system paths, and system configuration details, providing attackers with valuable intelligence to facilitate further attacks or exploitation. The root cause is improper access control (CWE-284) and sensitive information exposure (CWE-215). The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, making it highly accessible to attackers. Although no active exploits are currently known, the combination of unauthenticated data access and detailed error disclosures significantly raises the risk profile. The CVSS 3.1 score of 7.5 reflects a high severity rating, primarily due to the high confidentiality impact and ease of exploitation. The vulnerability affects operational telemetry data confidentiality but does not directly impact integrity or availability. Organizations deploying METIS WIC devices should urgently review their exposure of the /dbviewer/ endpoint, disable debug mode in production, and apply any available patches or mitigations once released.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive operational telemetry data collected by METIS WIC devices. Exposure of this data could lead to leakage of internal system states, operational metrics, or network configurations, which attackers could leverage for reconnaissance or to craft targeted attacks. The disclosure of backend source code and system paths via debug tracebacks further aids attackers in understanding the internal workings of the application, increasing the likelihood of successful exploitation of other vulnerabilities or unauthorized access. While the vulnerability does not directly affect system integrity or availability, the loss of confidentiality can have serious consequences, including regulatory non-compliance under GDPR if personal or sensitive data is indirectly exposed. Additionally, operational disruptions could occur if attackers use the disclosed information to escalate privileges or pivot within the network. Given the remote, unauthenticated nature of the exploit, the threat surface is broad, especially for organizations with internet-facing METIS WIC devices. This could impact critical infrastructure sectors in Europe that rely on METIS WIC for telemetry and operational monitoring, potentially undermining operational security and trust.
Mitigation Recommendations
European organizations should immediately audit their METIS WIC deployments to identify any instances running version oscore 2.1.234-r18 or other vulnerable versions. The following specific mitigations are recommended: 1) Restrict access to the /dbviewer/ endpoint by implementing strong authentication controls and network segmentation to limit exposure only to trusted internal users. 2) Disable debug mode in all production environments to prevent verbose error messages and traceback disclosures. 3) Monitor network traffic for unusual access attempts to the /dbviewer/ endpoint and implement intrusion detection rules to alert on suspicious activity. 4) If possible, apply vendor patches or updates as soon as they become available; if no patches exist yet, consider temporary compensating controls such as web application firewalls (WAFs) to block unauthorized access. 5) Conduct a thorough review of telemetry data stored in the SQLite database to assess sensitivity and consider encrypting or anonymizing data where feasible. 6) Educate IT and security teams about the risks of exposing debug information and enforce secure development and deployment practices. 7) Regularly review and update access control policies to ensure endpoints are not inadvertently exposed without authentication.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MHV
- Date Reserved
- 2026-02-09T13:38:44.756Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698c92b44b57a58fa19c028a
Added to database: 2/11/2026, 2:31:16 PM
Last enriched: 2/11/2026, 2:45:39 PM
Last updated: 2/11/2026, 5:59:08 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65480: n/a
UnknownCVE-2025-65128: n/a
HighCVE-2025-65127: n/a
HighCVE-2026-25084: CWE-306 Missing Authentication for Critical Function in ZLAN Information Technology Co. ZLAN5143D
CriticalCVE-2026-24789: CWE-306 in ZLAN Information Technology Co. ZLAN5143D
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.