Cyber Posture

CVE-2026-1019

Critical

Published: 16 January 2026

Published
16 January 2026
Modified
23 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 29.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-1019 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Gotac Police Statistics Database System. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 3 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-14 explicitly limits and documents permitted actions without identification or authentication, directly preventing exploitation of functionalities like the vulnerable endpoint that allows unauthenticated database access.

prevent

AC-3 enforces approved access control policies requiring authentication before granting read, modify, or delete access to database contents, blocking unauthenticated remote attackers.

prevent

IA-8 mandates identification and authentication for non-organizational users or processes, such as remote attackers, ensuring the specific functionality requires credentials rather than allowing open access.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
Why these techniques?

Missing authentication in public-facing database system enables remote exploitation (T1190) for unauthorized database access, directly facilitating data collection from databases (T1213.006), stored data manipulation (T1565.001), and data destruction via deletion (T1485).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Police Statistics Database System developed by Gotac has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.

Deeper analysisAI

CVE-2026-1019 is a Missing Authentication vulnerability (CWE-306) in the Police Statistics Database System developed by Gotac. Published on 2026-01-16, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and lack of prerequisites. The flaw enables unauthenticated remote attackers to read, modify, and delete database contents through a specific functionality lacking proper authentication controls.

Any unauthenticated attacker with network access to the affected system can exploit this vulnerability without user interaction or privileges. Successful exploitation grants full read, write, and delete access to the database, potentially compromising sensitive police statistics data, altering records, or disrupting service availability.

Advisories from TWCERT/CC provide further details on this vulnerability, available at https://www.twcert.org.tw/en/cp-139-10638-0e44b-2.html and https://www.twcert.org.tw/tw/cp-132-10637-3e4b3-1.html. Practitioners should consult these for recommended mitigations, such as implementing authentication mechanisms or restricting access to the vulnerable functionality.

Details

CWE(s)

Affected Products

gotac
police statistics database system
≤ 1.0.3

CVEs Like This One

CVE-2026-1021Same product: Gotac Police Statistics Database System
CVE-2026-1018Same product: Gotac Police Statistics Database System
CVE-2026-1023Same vendor: Gotac
CVE-2025-8861Shared CWE-306
CVE-2026-1022Same vendor: Gotac
CVE-2025-10452Shared CWE-306
CVE-2025-61956Shared CWE-306
CVE-2026-26340Shared CWE-306
CVE-2025-54816Shared CWE-306
CVE-2025-53072Shared CWE-306

References