Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24356: Missing Authorization in Roxnor GetGenie

0
High
VulnerabilityCVE-2026-24356cvecve-2026-24356
Published: Thu Jan 22 2026 (01/22/2026, 16:52:43 UTC)
Source: CVE Database V5
Vendor/Project: Roxnor
Product: GetGenie

Description

Missing Authorization vulnerability in Roxnor GetGenie getgenie allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects GetGenie: from n/a through <= 4.3.0.

AI-Powered Analysis

AILast updated: 01/30/2026, 09:46:27 UTC

Technical Analysis

CVE-2026-24356 is a missing authorization vulnerability found in Roxnor's GetGenie software versions up to 4.3.0. The vulnerability arises from incorrectly configured access control security levels within the application, which allows an attacker with low privileges to bypass authorization checks. This can lead to unauthorized access to sensitive functions or data, effectively compromising the confidentiality, integrity, and availability of the affected system. The CVSS v3.1 score of 8.8 reflects the critical nature of this flaw, with an attack vector over the network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits are currently known, the vulnerability's characteristics make it a prime candidate for exploitation once weaponized. The lack of available patches at the time of publication necessitates immediate defensive measures. Roxnor GetGenie is used in various enterprise environments, often integrated into business workflows, making this vulnerability particularly dangerous if exploited. The flaw's root cause is an access control misconfiguration, a common but critical security oversight that can lead to privilege escalation and unauthorized data manipulation or service disruption.

Potential Impact

For European organizations, exploitation of CVE-2026-24356 could lead to severe consequences including unauthorized data access, data tampering, and service outages. Given the high impact on confidentiality, integrity, and availability, sensitive business information could be exposed or altered, potentially causing financial loss, reputational damage, and regulatory non-compliance under GDPR. Organizations relying on GetGenie for critical business processes may experience operational disruptions. The network-based attack vector means that attackers could exploit this vulnerability remotely, increasing the risk of widespread impact across interconnected systems. The requirement for low privileges means insider threats or compromised accounts could be leveraged to escalate attacks. The absence of known exploits currently provides a window for proactive defense, but the high severity score demands urgent attention to prevent future exploitation. European sectors such as finance, healthcare, and government, which often use enterprise software like GetGenie, are particularly vulnerable to the ramifications of this flaw.

Mitigation Recommendations

1. Immediately audit and restrict network access to GetGenie instances, limiting exposure to trusted internal networks only. 2. Implement strict role-based access controls (RBAC) and review user privileges to ensure minimal necessary permissions are granted. 3. Monitor logs and network traffic for unusual access patterns or attempts to bypass authorization controls. 4. Engage with Roxnor for timelines on patches or updates addressing this vulnerability and prioritize applying them as soon as they become available. 5. Employ application-layer firewalls or intrusion prevention systems (IPS) to detect and block suspicious requests targeting GetGenie. 6. Conduct internal penetration testing focused on access control mechanisms within GetGenie to identify potential exploitation paths. 7. Educate system administrators and security teams about this vulnerability to enhance vigilance and incident response readiness. 8. Consider temporary compensating controls such as disabling non-essential features or interfaces in GetGenie that may be vulnerable until patches are applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-01-22T14:42:24.566Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259324623b1157c7fb4c2

Added to database: 1/22/2026, 5:06:58 PM

Last enriched: 1/30/2026, 9:46:27 AM

Last updated: 2/7/2026, 12:40:10 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats