Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24566: Missing Authorization in iNET iNET Webkit

0
Medium
VulnerabilityCVE-2026-24566cvecve-2026-24566
Published: Fri Jan 23 2026 (01/23/2026, 14:28:56 UTC)
Source: CVE Database V5
Vendor/Project: iNET
Product: iNET Webkit

Description

Missing Authorization vulnerability in iNET iNET Webkit inet-webkit allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects iNET Webkit: from n/a through <= 1.2.4.

AI-Powered Analysis

AILast updated: 01/31/2026, 08:40:21 UTC

Technical Analysis

CVE-2026-24566 is a missing authorization vulnerability affecting iNET Webkit versions up to and including 1.2.4. The flaw arises from incorrectly configured access control security levels, allowing users with low privileges (PR:L) to access sensitive information that should be restricted. The vulnerability is exploitable remotely over the network (AV:N) without requiring user interaction (UI:N), and it does not affect system integrity or availability, only confidentiality (C:H/I:N/A:N). This means an attacker who can authenticate with low-level credentials can bypass authorization checks to access data beyond their permission scope. The vulnerability does not require elevated privileges or user interaction, increasing its risk profile. However, no known exploits have been reported in the wild, and no official patches have been linked yet. The vulnerability affects iNET Webkit, a web framework product used in various enterprise and industrial applications, potentially exposing sensitive data handled by these systems. The CVSS score of 6.5 (medium) reflects the moderate risk due to the confidentiality impact and ease of exploitation by authenticated users. Organizations using affected versions should prioritize identifying and restricting access to vulnerable instances and monitor for suspicious access patterns.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality, potentially exposing sensitive business or operational data handled by iNET Webkit applications. Industries relying on iNET Webkit for web interfaces or industrial control systems could face data leakage risks, which may lead to competitive disadvantage, regulatory non-compliance (e.g., GDPR), and reputational damage. Since exploitation requires low-level authentication, insider threats or compromised low-privilege accounts could leverage this vulnerability to escalate data access. The lack of impact on integrity or availability reduces the risk of direct operational disruption but does not eliminate the risk of information exposure. European entities with critical infrastructure or sensitive data processed via iNET Webkit should consider this vulnerability a moderate threat vector. The absence of known exploits provides a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

1. Immediately audit all instances of iNET Webkit in your environment to identify affected versions (<=1.2.4). 2. Restrict network access to iNET Webkit interfaces to trusted internal networks or VPNs to reduce exposure. 3. Enforce strict access control policies and review user privileges to ensure minimal necessary access, especially for low-privilege accounts. 4. Implement enhanced monitoring and logging of access to iNET Webkit resources to detect anomalous or unauthorized access attempts. 5. Engage with the vendor for official patches or updates addressing this vulnerability and apply them promptly once available. 6. Consider deploying web application firewalls (WAF) with custom rules to detect and block unauthorized access patterns related to this vulnerability. 7. Educate users about credential security to prevent low-privilege account compromise. 8. If possible, isolate vulnerable systems from critical networks until patched. These steps go beyond generic advice by focusing on access restriction, monitoring, and vendor engagement specific to iNET Webkit environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-01-23T12:31:58.117Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69738adb4623b1157c48ba9f

Added to database: 1/23/2026, 2:51:07 PM

Last enriched: 1/31/2026, 8:40:21 AM

Last updated: 2/7/2026, 6:52:57 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats