Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3670: Improper Authorization in Freedom Factory dGEN1

0
Medium
VulnerabilityCVE-2026-3670cvecve-2026-3670
Published: Sat Mar 07 2026 (03/07/2026, 18:32:10 UTC)
Source: CVE Database V5
Vendor/Project: Freedom Factory
Product: dGEN1

Description

A vulnerability was detected in Freedom Factory dGEN1 up to 20260221. Affected is an unknown function of the component com.dgen.alarm. Performing a manipulation results in improper authorization. The attack requires a local approach. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/14/2026, 19:22:37 UTC

Technical Analysis

CVE-2026-3670 identifies an improper authorization vulnerability in the Freedom Factory dGEN1 product, specifically within an unspecified function of the com.dgen.alarm component. The vulnerability exists in versions up to 20260221 and allows a local attacker with limited privileges to manipulate the component in a way that bypasses authorization checks. The attack vector is local, requiring the attacker to have some level of access to the system, but does not require elevated privileges or user interaction. The vulnerability's CVSS 4.0 score is 4.8, reflecting medium severity due to the local attack vector and limited scope of impact. The exploit has been publicly disclosed, increasing the risk of exploitation, although no active exploitation in the wild has been reported. The vendor has not issued a patch or responded to disclosure attempts, leaving affected systems exposed. The vulnerability could allow unauthorized local users to perform actions that should be restricted, potentially compromising alarm system integrity and related security functions. Due to the lack of detailed technical information on the exact function affected, defenders must assume broad risk within the alarm component and implement compensating controls accordingly.

Potential Impact

The primary impact of CVE-2026-3670 is unauthorized local access to restricted functions within the Freedom Factory dGEN1 alarm component. This could lead to unauthorized manipulation of alarm settings, suppression or triggering of alarms, or other unauthorized actions that compromise system integrity and availability. Confidentiality impacts may arise if alarm data or logs are exposed or altered. The local attack requirement limits the scope to insiders or attackers who have gained local access, reducing remote exploitation risk but increasing risk from insider threats or compromised local accounts. The absence of vendor response and patches prolongs exposure, increasing the window for potential exploitation. Organizations relying on dGEN1 for critical alarm or security functions could face operational disruptions, false alarms, or failure to detect genuine security events, impacting physical security and safety. The medium severity rating reflects these moderate but tangible risks.

Mitigation Recommendations

1. Restrict local access to systems running Freedom Factory dGEN1 to trusted personnel only, enforcing strict access controls and monitoring. 2. Implement robust local user account management, including least privilege principles and regular auditing of local accounts and permissions. 3. Monitor system logs and alarm component activity for unusual or unauthorized actions that could indicate exploitation attempts. 4. Employ host-based intrusion detection or prevention systems to detect suspicious local manipulations of the alarm component. 5. If possible, isolate the affected component or system from less trusted network segments to reduce risk of lateral movement. 6. Engage with Freedom Factory for updates or patches and subscribe to vulnerability advisories for timely remediation once available. 7. Consider deploying compensating controls such as multi-factor authentication for local logins and enhanced physical security to prevent unauthorized local access. 8. Prepare incident response plans specifically addressing potential misuse of alarm systems to ensure rapid detection and recovery.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-06T20:53:32.678Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ac726ec48b3f10ffbca736

Added to database: 3/7/2026, 6:46:06 PM

Last enriched: 3/14/2026, 7:22:37 PM

Last updated: 4/22/2026, 5:53:52 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses