CVE-2026-2668: Improper Access Controls in Rongzhitong Visual Integrated Command and Dispatch Platform
A vulnerability was found in Rongzhitong Visual Integrated Command and Dispatch Platform up to 20260206. This affects an unknown function of the file /dm/dispatch/user/add of the component User Handler. The manipulation results in improper access controls. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-2668 identifies an improper access control vulnerability in the Rongzhitong Visual Integrated Command and Dispatch Platform, specifically affecting the /dm/dispatch/user/add function within the User Handler component. This flaw allows remote attackers to bypass authentication and authorization mechanisms, enabling unauthorized manipulation of user-related operations. The vulnerability is exploitable over the network without requiring any privileges or user interaction, increasing its risk profile. The CVSS 4.0 base score of 6.9 reflects a medium severity, considering the ease of exploitation and the potential impact on confidentiality, integrity, and availability, albeit with limited scope and no privilege escalation. The vendor has not issued a patch or official response, despite early notification, and a public exploit has been disclosed, raising the risk of exploitation. The platform is typically used in command and dispatch environments, which are critical for public safety and emergency response, making this vulnerability particularly sensitive. The lack of authentication requirements and the ability to remotely trigger the flaw mean attackers could potentially add or manipulate user accounts or dispatch commands, disrupting operations or gaining further access. No mitigations or patches have been published, necessitating immediate defensive measures by affected organizations.
Potential Impact
The vulnerability could allow attackers to perform unauthorized actions on the command and dispatch platform, potentially leading to unauthorized access to sensitive operational data, manipulation of dispatch commands, or disruption of emergency response workflows. This could degrade the integrity and availability of critical public safety systems, causing delays or errors in emergency services. Confidentiality may also be compromised if attackers access sensitive user or operational data. The remote, unauthenticated nature of the exploit increases the likelihood of attacks, especially in environments exposed to untrusted networks. The absence of vendor patches and the existence of public exploits elevate the risk of exploitation. Organizations relying on this platform for critical infrastructure or emergency management face operational risks, reputational damage, and potential regulatory consequences if the vulnerability is exploited.
Mitigation Recommendations
Since no official patch is available, organizations should implement immediate compensating controls. These include isolating the affected platform within a secure network segment with strict firewall rules limiting access to trusted IPs only. Employ network intrusion detection and prevention systems to monitor and block suspicious traffic targeting the /dm/dispatch/user/add endpoint. Enforce strong authentication and authorization policies at network and application layers where possible, including VPN access or zero-trust network access solutions. Conduct thorough logging and continuous monitoring of user management and dispatch-related activities to detect anomalies. Engage with the vendor for updates and consider alternative platforms if remediation is delayed. Additionally, conduct security awareness training for administrators to recognize and respond to potential exploitation attempts. Regularly review and update incident response plans to address potential exploitation scenarios involving this vulnerability.
Affected Countries
China, United States, Russia, India, South Korea, Japan, Germany, France, United Kingdom, Brazil
CVE-2026-2668: Improper Access Controls in Rongzhitong Visual Integrated Command and Dispatch Platform
Description
A vulnerability was found in Rongzhitong Visual Integrated Command and Dispatch Platform up to 20260206. This affects an unknown function of the file /dm/dispatch/user/add of the component User Handler. The manipulation results in improper access controls. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2668 identifies an improper access control vulnerability in the Rongzhitong Visual Integrated Command and Dispatch Platform, specifically affecting the /dm/dispatch/user/add function within the User Handler component. This flaw allows remote attackers to bypass authentication and authorization mechanisms, enabling unauthorized manipulation of user-related operations. The vulnerability is exploitable over the network without requiring any privileges or user interaction, increasing its risk profile. The CVSS 4.0 base score of 6.9 reflects a medium severity, considering the ease of exploitation and the potential impact on confidentiality, integrity, and availability, albeit with limited scope and no privilege escalation. The vendor has not issued a patch or official response, despite early notification, and a public exploit has been disclosed, raising the risk of exploitation. The platform is typically used in command and dispatch environments, which are critical for public safety and emergency response, making this vulnerability particularly sensitive. The lack of authentication requirements and the ability to remotely trigger the flaw mean attackers could potentially add or manipulate user accounts or dispatch commands, disrupting operations or gaining further access. No mitigations or patches have been published, necessitating immediate defensive measures by affected organizations.
Potential Impact
The vulnerability could allow attackers to perform unauthorized actions on the command and dispatch platform, potentially leading to unauthorized access to sensitive operational data, manipulation of dispatch commands, or disruption of emergency response workflows. This could degrade the integrity and availability of critical public safety systems, causing delays or errors in emergency services. Confidentiality may also be compromised if attackers access sensitive user or operational data. The remote, unauthenticated nature of the exploit increases the likelihood of attacks, especially in environments exposed to untrusted networks. The absence of vendor patches and the existence of public exploits elevate the risk of exploitation. Organizations relying on this platform for critical infrastructure or emergency management face operational risks, reputational damage, and potential regulatory consequences if the vulnerability is exploited.
Mitigation Recommendations
Since no official patch is available, organizations should implement immediate compensating controls. These include isolating the affected platform within a secure network segment with strict firewall rules limiting access to trusted IPs only. Employ network intrusion detection and prevention systems to monitor and block suspicious traffic targeting the /dm/dispatch/user/add endpoint. Enforce strong authentication and authorization policies at network and application layers where possible, including VPN access or zero-trust network access solutions. Conduct thorough logging and continuous monitoring of user management and dispatch-related activities to detect anomalies. Engage with the vendor for updates and consider alternative platforms if remediation is delayed. Additionally, conduct security awareness training for administrators to recognize and respond to potential exploitation attempts. Regularly review and update incident response plans to address potential exploitation scenarios involving this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-18T09:10:15.714Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699631fa6aea4a407aeb569a
Added to database: 2/18/2026, 9:41:14 PM
Last enriched: 2/28/2026, 1:37:58 PM
Last updated: 4/4/2026, 9:12:04 PM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.