Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2668: Improper Access Controls in Rongzhitong Visual Integrated Command and Dispatch Platform

0
Medium
VulnerabilityCVE-2026-2668cvecve-2026-2668
Published: Wed Feb 18 2026 (02/18/2026, 20:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Rongzhitong
Product: Visual Integrated Command and Dispatch Platform

Description

CVE-2026-2668 is a medium-severity vulnerability in the Rongzhitong Visual Integrated Command and Dispatch Platform, specifically affecting the /dm/dispatch/user/add endpoint in the User Handler component. It allows remote attackers to bypass access controls without authentication or user interaction, potentially enabling unauthorized user additions or privilege escalations. The vulnerability is due to improper access control implementation, and although an exploit is publicly available, no active exploitation has been reported. The vendor has not responded to disclosure attempts, and no patches are currently available. European organizations using this platform, especially in critical infrastructure or emergency services, could face risks of unauthorized access or manipulation of dispatch operations. Mitigation requires network-level restrictions, strict monitoring of platform usage, and potentially deploying web application firewalls with custom rules. Countries with higher adoption of Rongzhitong or similar command platforms, and those with strategic emergency response systems, are more likely to be impacted. Given the ease of exploitation and potential impact on confidentiality, integrity, and availability of dispatch operations, the vulnerability is rated medium severity. Defenders should prioritize detection and containment measures while awaiting vendor remediation.

AI-Powered Analysis

AILast updated: 02/18/2026, 21:55:46 UTC

Technical Analysis

CVE-2026-2668 is an improper access control vulnerability identified in the Rongzhitong Visual Integrated Command and Dispatch Platform, version up to 20260206. The flaw resides in an unspecified function within the /dm/dispatch/user/add endpoint of the User Handler component. This vulnerability allows remote attackers to bypass intended access restrictions without requiring authentication or user interaction, enabling them to manipulate user-related functions such as adding users or modifying user privileges. The root cause is a failure to enforce proper authorization checks on sensitive operations, which could lead to unauthorized access or privilege escalation within the platform. The vulnerability has a CVSS v4.0 base score of 6.9, reflecting medium severity, with attack vector being network-based, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. Although an exploit has been publicly disclosed, there are no confirmed reports of active exploitation in the wild. The vendor was notified early but has not issued any response or patch, leaving affected users exposed. This platform is typically used for integrated command and dispatch operations, often in critical infrastructure or emergency response contexts, making the vulnerability particularly sensitive. The absence of vendor remediation necessitates alternative mitigation strategies to prevent unauthorized access and maintain operational integrity.

Potential Impact

For European organizations, particularly those involved in emergency services, public safety, or critical infrastructure management that utilize the Rongzhitong Visual Integrated Command and Dispatch Platform, this vulnerability poses significant risks. Unauthorized access to user management functions could allow attackers to create or modify user accounts, potentially granting themselves elevated privileges or disrupting dispatch operations. This could lead to compromised confidentiality of sensitive operational data, integrity violations through unauthorized changes, and availability issues if dispatch services are manipulated or disabled. The impact is heightened in environments where the platform controls critical response coordination, as disruption could delay emergency responses or cause operational chaos. Additionally, the lack of vendor response and patches increases the window of exposure, making proactive defensive measures essential. While no active exploitation has been reported, the public availability of exploits increases the likelihood of future attacks targeting European entities using this platform or similar systems.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Restrict network access to the affected platform endpoints by implementing strict firewall rules and network segmentation to limit exposure to trusted internal networks only. 2) Deploy Web Application Firewalls (WAFs) with custom rules designed to detect and block unauthorized requests targeting the /dm/dispatch/user/add endpoint or suspicious user management activities. 3) Conduct thorough audits and monitoring of user account creation and modification logs to detect anomalous behavior indicative of exploitation attempts. 4) Enforce strong authentication and authorization policies at the network and application layers, including multi-factor authentication where possible, to reduce risk from compromised credentials. 5) Isolate the platform from direct internet exposure and use VPNs or secure tunnels for remote access. 6) Prepare incident response plans specific to potential exploitation scenarios involving unauthorized user additions or privilege escalations. 7) Engage with the vendor or community for updates and consider alternative platforms if remediation is not forthcoming. These measures go beyond generic advice by focusing on access control hardening, monitoring, and network-level protections tailored to the vulnerability's characteristics.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-18T09:10:15.714Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699631fa6aea4a407aeb569a

Added to database: 2/18/2026, 9:41:14 PM

Last enriched: 2/18/2026, 9:55:46 PM

Last updated: 2/18/2026, 11:21:26 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats