Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23759: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Perle Systems IOLAN STS

0
High
VulnerabilityCVE-2026-23759cvecve-2026-23759cwe-78
Published: Tue Mar 17 2026 (03/17/2026, 15:20:10 UTC)
Source: CVE Database V5
Vendor/Project: Perle Systems
Product: IOLAN STS

Description

CVE-2026-23759 is a high-severity OS command injection vulnerability affecting Perle Systems IOLAN STS terminal servers with firmware versions prior to 6. 0. The issue arises in the restricted shell accessed via Telnet or SSH, specifically in the 'ps' command, which fails to properly sanitize user-supplied arguments. An authenticated attacker can inject shell metacharacters after the 'ps' subcommand, causing arbitrary commands to execute with root privileges. This leads to full compromise of the device's underlying operating system. Exploitation requires valid authentication but no user interaction beyond login. No known exploits are currently reported in the wild. The vulnerability has a CVSS 4. 0 base score of 8. 6, reflecting its high impact and ease of exploitation once authenticated.

AI-Powered Analysis

AILast updated: 03/17/2026, 18:28:33 UTC

Technical Analysis

CVE-2026-23759 is an OS command injection vulnerability identified in Perle Systems IOLAN STS terminal servers running firmware versions prior to 6.0. The vulnerability stems from improper neutralization of special elements (CWE-78) in the restricted shell environment accessible via Telnet or SSH. Specifically, the 'ps' command within this shell does not sanitize user-supplied arguments before passing them to a shell invocation ('sh -c') executed with root privileges. This flaw allows an authenticated attacker, who can log into the device, to append shell metacharacters or commands after the 'ps' subcommand, resulting in arbitrary command execution as root. The root-level execution grants complete control over the device, enabling actions such as installing malware, modifying configurations, or pivoting within the network. The vulnerability requires authentication but no additional user interaction, making it a significant risk in environments where credential compromise or insider threats exist. The CVSS 4.0 score of 8.6 reflects the network attack vector, low attack complexity, no privileges beyond authentication needed, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability's nature makes it a critical concern for affected organizations. The lack of a patch link indicates that a firmware update addressing this issue may be forthcoming or in development. The vulnerability affects all IOLAN STS/SCS terminal server models with firmware prior to version 6.0, which are commonly used in industrial, telecommunications, and enterprise environments for serial device connectivity and management.

Potential Impact

The impact of CVE-2026-23759 is severe for organizations using affected Perle IOLAN STS terminal servers. Successful exploitation results in full root-level compromise of the device, allowing attackers to execute arbitrary commands, modify or disrupt device operations, and potentially gain a foothold within the internal network. This can lead to unauthorized data access, disruption of critical serial device communications, and lateral movement to other network assets. Given that these terminal servers often manage serial connections for industrial control systems, telecommunications infrastructure, or enterprise hardware, compromise could disrupt operational technology environments or critical business processes. The vulnerability's exploitation could facilitate espionage, sabotage, or ransomware deployment. Since exploitation requires authentication, the risk is heightened in scenarios where credentials are weak, reused, or compromised. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation, as attackers may develop exploits rapidly once details are public. Overall, the vulnerability poses a significant threat to confidentiality, integrity, and availability of systems relying on these terminal servers.

Mitigation Recommendations

To mitigate CVE-2026-23759, organizations should take the following specific actions: 1) Immediately identify and inventory all Perle IOLAN STS/SCS terminal servers in their environment and verify firmware versions. 2) Upgrade all affected devices to firmware version 6.0 or later once available, as this version addresses the vulnerability by properly sanitizing command arguments. 3) Restrict administrative access to these devices by enforcing strong authentication mechanisms, such as multi-factor authentication, and limiting access to trusted personnel only. 4) Disable Telnet access if possible, favoring SSH with hardened configurations to reduce attack surface. 5) Implement network segmentation to isolate terminal servers from general user networks and limit exposure to potential attackers. 6) Monitor device logs and network traffic for unusual command executions or login attempts indicative of exploitation attempts. 7) Regularly rotate and enforce strong passwords for device accounts to reduce risk from credential compromise. 8) If immediate firmware upgrade is not feasible, consider disabling or restricting use of the vulnerable 'ps' command or the restricted shell access, if configurable, to limit exploitation vectors. 9) Engage with Perle Systems support for official patches, advisories, and guidance. These targeted measures go beyond generic advice by focusing on access control, monitoring, and device-specific configurations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-15T18:42:20.938Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b99a3b771bdb1749cb0c80

Added to database: 3/17/2026, 6:15:23 PM

Last enriched: 3/17/2026, 6:28:33 PM

Last updated: 3/18/2026, 7:09:40 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses