Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3999: CWE-639 Authorization bypass through User-Controlled key in Pointsharp ID Server

0
High
VulnerabilityCVE-2026-3999cvecve-2026-3999cwe-639
Published: Fri Mar 13 2026 (03/13/2026, 08:38:59 UTC)
Source: CVE Database V5
Vendor/Project: Pointsharp
Product: ID Server

Description

A broken access control may allow an authenticated user to perform a horizontal privilege escalation. The vulnerability only impacts specific configurations.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/21/2026, 00:42:03 UTC

Technical Analysis

CVE-2026-3999 is a vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Pointsharp ID Server product. The issue arises from broken access control mechanisms that allow an authenticated user with low privileges to escalate their access horizontally, meaning they can access or manipulate resources or data belonging to other users with the same privilege level. The vulnerability is tied to specific configurations of the product, implying that not all deployments are affected. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L), and partial authentication (PR:L) but no user interaction (UI:N). The vulnerability impacts confidentiality and integrity with high scope, indicating that the compromise can affect resources beyond the initially compromised component. The vulnerability was published on March 13, 2026, with no known exploits in the wild at the time of reporting. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for monitoring vendor advisories. The vulnerability could allow attackers to bypass authorization controls by manipulating user-controlled keys, which may be parameters or tokens used within the ID Server to control access. This could lead to unauthorized access to sensitive information or unauthorized actions within the system. The vulnerability's presence in identity management infrastructure makes it particularly critical, as it could undermine authentication and authorization processes foundational to organizational security.

Potential Impact

The impact of CVE-2026-3999 is significant for organizations relying on Pointsharp ID Server for identity and access management. Successful exploitation allows an authenticated user to access or manipulate data and resources of other users at the same privilege level, potentially leading to data breaches, unauthorized transactions, or disruption of services. This horizontal privilege escalation can undermine trust in the identity management system, leading to broader security risks such as insider threats or lateral movement within networks. Confidentiality and integrity are primarily affected, with availability not directly impacted. Organizations in sectors with strict compliance requirements (e.g., finance, healthcare, government) may face regulatory consequences if unauthorized access occurs. The vulnerability's exploitation ease and network accessibility increase the risk profile, especially in environments where multiple users have authenticated access. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation, making proactive mitigation critical.

Mitigation Recommendations

To mitigate CVE-2026-3999, organizations should first identify if their Pointsharp ID Server deployments are running affected configurations. Since no patches are currently linked, immediate steps include reviewing and tightening access control policies, especially those involving user-controlled keys or parameters. Implement strict input validation and parameter sanitization to prevent manipulation of authorization keys. Employ network segmentation and least privilege principles to limit the impact of potential horizontal escalations. Monitor authentication and authorization logs for unusual access patterns indicative of privilege abuse. Engage with Pointsharp support or vendor advisories for forthcoming patches or workarounds. Consider deploying compensating controls such as multi-factor authentication (MFA) to reduce the risk of compromised accounts being leveraged for exploitation. Regularly update and audit identity management configurations to ensure adherence to security best practices. Finally, prepare incident response plans to quickly address any detected exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ENISA
Date Reserved
2026-03-11T17:52:20.020Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b3ceae2f860ef943b31146

Added to database: 3/13/2026, 8:45:34 AM

Last enriched: 3/21/2026, 12:42:03 AM

Last updated: 4/27/2026, 8:11:17 PM

Views: 686

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses