Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26722: n/a

0
Critical
VulnerabilityCVE-2026-26722cvecve-2026-26722
Published: Fri Feb 20 2026 (02/20/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Key Systems Inc Global Facilities Management Software v.20230721a allows a remote attacker to escalate privileges via PIN component of the login functionality.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 13:19:43 UTC

Technical Analysis

CVE-2026-26722 is a critical remote privilege escalation vulnerability identified in Key Systems Inc Global Facilities Management Software version 20230721a. The vulnerability resides in the PIN component of the login functionality, which is improperly implemented, allowing an unauthenticated remote attacker to escalate privileges without user interaction. The CVSS v3.1 score of 9.4 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H) reflects that the attack vector is network-based, requires low attack complexity, no privileges or user interaction, and affects the confidentiality, integrity, and availability of the system. The weakness corresponds to CWE-269, indicating improper privilege management. Exploitation could enable attackers to gain elevated access rights, potentially leading to unauthorized control over facility management operations, data leakage, or disruption of critical services. Although no patches or known exploits are currently available, the vulnerability's critical nature demands urgent attention. The lack of affected version details beyond the stated version suggests the need for further vendor communication and monitoring for updates.

Potential Impact

The vulnerability poses a severe risk to organizations relying on Key Systems Inc Global Facilities Management Software, especially those managing critical infrastructure or sensitive facilities. Successful exploitation can lead to unauthorized privilege escalation, enabling attackers to manipulate facility controls, access sensitive data, or disrupt operations. This can result in operational downtime, data breaches, and potential safety hazards. The broad network attack vector and absence of required authentication increase the likelihood of exploitation. Organizations worldwide using this software could face significant operational and reputational damage. The inability to currently patch the vulnerability exacerbates the risk, necessitating immediate compensating controls. Additionally, attackers could leverage this vulnerability as a foothold for lateral movement within networks, amplifying the impact.

Mitigation Recommendations

Given the absence of official patches, organizations should implement strict network segmentation to isolate the affected software from untrusted networks. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics targeting anomalous login attempts or privilege escalation patterns related to the PIN component. Enforce strict access controls and monitor authentication logs for suspicious activity. If possible, disable or restrict remote access to the affected software until a patch is available. Engage with the vendor for timely updates and advisories. Conduct regular security assessments and penetration testing focused on the login mechanisms. Prepare incident response plans specific to potential exploitation scenarios. Consider deploying multi-factor authentication at network gateways to reduce exposure. Maintain up-to-date backups and ensure rapid recovery capabilities in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998c9e7be58cf853bab82a0

Added to database: 2/20/2026, 8:53:59 PM

Last enriched: 2/28/2026, 1:19:43 PM

Last updated: 4/7/2026, 1:33:11 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses