Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23647: CWE-798 Use of Hard-coded Credentials in Glory Global Solutions RBG-100

0
Critical
VulnerabilityCVE-2026-23647cvecve-2026-23647cwe-798
Published: Tue Feb 17 2026 (02/17/2026, 16:30:06 UTC)
Source: CVE Database V5
Vendor/Project: Glory Global Solutions
Product: RBG-100

Description

Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrative privileges, were found to have fixed, embedded passwords. An attacker with network access to exposed services such as SSH may authenticate using these credentials and gain unauthorized access to the system. Successful exploitation allows remote access with elevated privileges and may result in full system compromise.

AI-Powered Analysis

AILast updated: 02/18/2026, 08:30:15 UTC

Technical Analysis

CVE-2026-23647 identifies a severe security vulnerability in the Glory Global Solutions RBG-100 recycler systems, specifically within the ISPK-08 software component. The root cause is the presence of hard-coded operating system credentials embedded in the software, which are fixed and cannot be changed by administrators. These credentials apply to multiple local user accounts, including those with administrative privileges, which significantly increases the risk. Because these passwords are hard-coded, an attacker who can reach exposed network services such as SSH can authenticate remotely without needing to guess or brute-force credentials. This bypasses normal authentication mechanisms and grants immediate elevated access to the underlying Linux operating system. Once inside, an attacker can execute arbitrary commands, potentially leading to full system compromise, data theft, or disruption of the recycler's operations. The vulnerability does not require any user interaction or prior authentication, making it highly exploitable. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H) reflects network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the critical nature of the flaw demands immediate attention. The affected product, RBG-100, is widely used in cash recycling and handling environments, which are critical for financial institutions and retail sectors. The lack of available patches at the time of publication increases the urgency for organizations to implement compensating controls.

Potential Impact

For European organizations, the impact of this vulnerability is substantial. The RBG-100 systems are often deployed in financial institutions, retail chains, and cash handling facilities, all of which are critical infrastructure components. Exploitation could lead to unauthorized access to these systems, allowing attackers to manipulate cash recycler operations, disrupt financial transactions, or use the compromised devices as footholds for lateral movement within corporate networks. This could result in financial losses, operational downtime, reputational damage, and regulatory penalties under GDPR and other compliance frameworks. The elevated privileges gained through exploitation mean attackers could also install persistent malware or exfiltrate sensitive data. Given the criticality of cash handling in many European economies and the interconnectedness of financial systems, the threat extends beyond individual organizations to potentially impact broader economic stability and trust in financial services.

Mitigation Recommendations

Immediate mitigation should focus on network-level controls to restrict access to the RBG-100 devices. Organizations should isolate these systems in dedicated network segments with strict firewall rules limiting SSH and other management service access to trusted administrators only. If possible, disable SSH or other exposed services until a patch is available. Since the credentials are hard-coded and cannot be changed, monitoring for unauthorized access attempts and unusual activity on these devices is essential. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures for suspicious login attempts can help detect exploitation attempts. Organizations should engage with Glory Global Solutions for updates or patches and apply them promptly once released. Additionally, consider physical security controls to prevent unauthorized local access. For longer-term risk reduction, organizations should evaluate alternative devices or software components that do not have such fundamental security flaws. Incident response plans should be updated to include this vulnerability and potential compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-14T16:55:09.103Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699575bb80d747be205376b1

Added to database: 2/18/2026, 8:18:03 AM

Last enriched: 2/18/2026, 8:30:15 AM

Last updated: 2/19/2026, 7:06:53 PM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats