Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26333: CWE-306 Missing Authentication for Critical Function in Calero VeraSMART

0
Critical
VulnerabilityCVE-2026-26333cvecve-2026-26333cwe-306cwe-502
Published: Fri Feb 13 2026 (02/13/2026, 20:51:57 UTC)
Source: CVE Database V5
Vendor/Project: Calero
Product: VeraSMART

Description

CVE-2026-26333 is a critical unauthenticated remote code execution vulnerability in Calero VeraSMART versions prior to 2022 R1. The product exposes a . NET Remoting HTTP service on TCP port 8001 without authentication, allowing attackers to invoke remoting endpoints and perform arbitrary file read/write operations. Sensitive files such as web. config can be accessed, leaking IIS machineKey values that enable crafting malicious ASP. NET ViewState payloads for remote code execution. Additionally, attackers can trigger outbound SMB authentication attempts to capture NTLMv2 hashes for relay or offline cracking. This vulnerability has a CVSS 4. 0 score of 10. 0, indicating maximum severity, and requires no authentication or user interaction.

AI-Powered Analysis

AILast updated: 02/13/2026, 22:04:01 UTC

Technical Analysis

Calero VeraSMART versions prior to 2022 R1 contain a critical vulnerability (CVE-2026-26333) due to missing authentication on a .NET Remoting HTTP service exposed on TCP port 8001. This service publishes default ObjectURIs such as EndeavorServer.rem and RemoteFileReceiver.rem and accepts SOAP and binary formatters with TypeFilterLevel set to Full, which is highly permissive. An unauthenticated remote attacker can invoke these remoting endpoints to perform arbitrary file read and write operations via the WebClient class. This allows attackers to retrieve sensitive configuration files like WebRoot\web.config, which contain IIS machineKey validation and decryption keys. With these keys, attackers can craft malicious ASP.NET ViewState payloads to achieve remote code execution within the IIS application context, effectively compromising the server. Furthermore, by supplying a UNC path, attackers can cause the service to initiate outbound SMB authentication attempts using the service account's credentials, potentially exposing NTLMv2 hashes. These hashes can be captured for relay attacks or offline cracking, further escalating privileges or lateral movement. The vulnerability is rated critical with a CVSS 4.0 score of 10.0, reflecting its ease of exploitation (no authentication or user interaction required) and severe impact on confidentiality, integrity, and availability. No patches are currently linked, and no known exploits in the wild have been reported yet, but the risk of exploitation is high given the nature of the flaw.

Potential Impact

For European organizations, exploitation of CVE-2026-26333 could lead to complete compromise of affected VeraSMART servers, resulting in unauthorized access to sensitive corporate data and disruption of telecommunication management services. The ability to execute arbitrary code remotely without authentication threatens confidentiality, integrity, and availability of critical infrastructure. Exposure of IIS machineKey values can also undermine other ASP.NET applications on the same server. The potential for NTLMv2 hash capture increases risk of lateral movement and privilege escalation within enterprise networks. Organizations relying on VeraSMART for telecom expense management or related services may face operational disruptions, data breaches, and compliance violations under GDPR due to unauthorized data access. The critical severity and ease of exploitation make this a high-priority threat for affected entities across Europe.

Mitigation Recommendations

Immediate mitigation steps include restricting network access to TCP port 8001 to trusted internal hosts only, using network segmentation and firewall rules to block external access. Organizations should upgrade VeraSMART to version 2022 R1 or later where the vulnerability is fixed. If upgrading is not immediately possible, disabling the .NET Remoting HTTP service or applying custom access controls to enforce authentication on the exposed endpoints is recommended. Monitoring network traffic for unusual SMB authentication attempts and anomalous access to port 8001 can help detect exploitation attempts. Additionally, auditing IIS web.config files and rotating machineKey values after remediation can prevent reuse of leaked keys. Implementing strong network-level authentication and encryption for internal services will reduce attack surface. Finally, organizations should prepare incident response plans for potential exploitation scenarios involving remote code execution and credential theft.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-13T17:28:43.050Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698f9c59c9e1ff5ad86a8edf

Added to database: 2/13/2026, 9:49:13 PM

Last enriched: 2/13/2026, 10:04:01 PM

Last updated: 2/13/2026, 11:13:52 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats