CVE-2026-2669: Improper Access Controls in Rongzhitong Visual Integrated Command and Dispatch Platform
A vulnerability was determined in Rongzhitong Visual Integrated Command and Dispatch Platform up to 20260206. This impacts an unknown function of the file /dm/dispatch/user/delete of the component User Handler. This manipulation of the argument ID causes improper access controls. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-2669 identifies an improper access control vulnerability in the Rongzhitong Visual Integrated Command and Dispatch Platform version 20260206 and earlier. The vulnerability is located in the User Handler component, specifically in the /dm/dispatch/user/delete endpoint, where manipulation of the ID parameter allows unauthorized remote attackers to perform deletion operations without authentication or user interaction. This lack of proper authorization checks means that an attacker can remotely invoke this function to delete user accounts or potentially disrupt user management processes. The vulnerability has been publicly disclosed, and exploit code is available, although no known active exploitation in the wild has been reported yet. The vendor has not responded to disclosure attempts and has not provided patches, leaving systems exposed. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and impacts on integrity and availability. Given the platform's role in command and dispatch operations, exploitation could lead to unauthorized user deletions, disrupting operational continuity and potentially causing denial of service or loss of control over dispatch functions. The absence of authentication requirements and the remote nature of the exploit make this vulnerability particularly concerning for critical infrastructure relying on this platform.
Potential Impact
For European organizations, especially those in public safety, emergency services, or critical infrastructure sectors using the Rongzhitong Visual Integrated Command and Dispatch Platform, this vulnerability poses a significant risk. Exploitation could lead to unauthorized deletion of user accounts, potentially disabling legitimate users from accessing the system or disrupting command and dispatch workflows. This can degrade operational effectiveness, delay emergency responses, and compromise public safety. The integrity of user management is compromised, and availability may be affected if key accounts are deleted or system functions are disrupted. Given the platform’s role in integrated command and dispatch, such disruptions could have cascading effects on coordinated responses and critical decision-making processes. The lack of vendor response and patches increases the risk exposure for European entities relying on this software. Additionally, the public availability of exploit information raises the likelihood of opportunistic attacks targeting unpatched systems.
Mitigation Recommendations
1. Implement strict network segmentation to isolate the Rongzhitong platform from general network access, restricting access to trusted management networks only. 2. Deploy Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block requests targeting the /dm/dispatch/user/delete endpoint, especially those with suspicious or malformed ID parameters. 3. Enforce strong access control policies at the network and application layers, including IP whitelisting and VPN requirements for administrative access. 4. Monitor logs and network traffic for unusual deletion requests or repeated access attempts to the vulnerable endpoint. 5. If possible, disable or restrict the /dm/dispatch/user/delete functionality until a vendor patch is available. 6. Engage with the vendor or third-party security providers to seek patches or mitigations, and consider alternative platforms if the vendor remains unresponsive. 7. Conduct regular security audits and penetration testing focused on access control mechanisms within the platform. 8. Educate operational staff about the risks and signs of exploitation to ensure rapid detection and response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Norway
CVE-2026-2669: Improper Access Controls in Rongzhitong Visual Integrated Command and Dispatch Platform
Description
A vulnerability was determined in Rongzhitong Visual Integrated Command and Dispatch Platform up to 20260206. This impacts an unknown function of the file /dm/dispatch/user/delete of the component User Handler. This manipulation of the argument ID causes improper access controls. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2026-2669 identifies an improper access control vulnerability in the Rongzhitong Visual Integrated Command and Dispatch Platform version 20260206 and earlier. The vulnerability is located in the User Handler component, specifically in the /dm/dispatch/user/delete endpoint, where manipulation of the ID parameter allows unauthorized remote attackers to perform deletion operations without authentication or user interaction. This lack of proper authorization checks means that an attacker can remotely invoke this function to delete user accounts or potentially disrupt user management processes. The vulnerability has been publicly disclosed, and exploit code is available, although no known active exploitation in the wild has been reported yet. The vendor has not responded to disclosure attempts and has not provided patches, leaving systems exposed. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and impacts on integrity and availability. Given the platform's role in command and dispatch operations, exploitation could lead to unauthorized user deletions, disrupting operational continuity and potentially causing denial of service or loss of control over dispatch functions. The absence of authentication requirements and the remote nature of the exploit make this vulnerability particularly concerning for critical infrastructure relying on this platform.
Potential Impact
For European organizations, especially those in public safety, emergency services, or critical infrastructure sectors using the Rongzhitong Visual Integrated Command and Dispatch Platform, this vulnerability poses a significant risk. Exploitation could lead to unauthorized deletion of user accounts, potentially disabling legitimate users from accessing the system or disrupting command and dispatch workflows. This can degrade operational effectiveness, delay emergency responses, and compromise public safety. The integrity of user management is compromised, and availability may be affected if key accounts are deleted or system functions are disrupted. Given the platform’s role in integrated command and dispatch, such disruptions could have cascading effects on coordinated responses and critical decision-making processes. The lack of vendor response and patches increases the risk exposure for European entities relying on this software. Additionally, the public availability of exploit information raises the likelihood of opportunistic attacks targeting unpatched systems.
Mitigation Recommendations
1. Implement strict network segmentation to isolate the Rongzhitong platform from general network access, restricting access to trusted management networks only. 2. Deploy Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom rules to detect and block requests targeting the /dm/dispatch/user/delete endpoint, especially those with suspicious or malformed ID parameters. 3. Enforce strong access control policies at the network and application layers, including IP whitelisting and VPN requirements for administrative access. 4. Monitor logs and network traffic for unusual deletion requests or repeated access attempts to the vulnerable endpoint. 5. If possible, disable or restrict the /dm/dispatch/user/delete functionality until a vendor patch is available. 6. Engage with the vendor or third-party security providers to seek patches or mitigations, and consider alternative platforms if the vendor remains unresponsive. 7. Conduct regular security audits and penetration testing focused on access control mechanisms within the platform. 8. Educate operational staff about the risks and signs of exploitation to ensure rapid detection and response.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-18T09:10:18.617Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69962e786aea4a407ae92217
Added to database: 2/18/2026, 9:26:16 PM
Last enriched: 2/18/2026, 9:42:17 PM
Last updated: 2/21/2026, 12:20:11 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.