CVE-2026-1019
Published: 16 January 2026
Summary
CVE-2026-1019 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Gotac Police Statistics Database System. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-14 explicitly limits and documents permitted actions without identification or authentication, directly preventing exploitation of functionalities like the vulnerable endpoint that allows unauthenticated database access.
AC-3 enforces approved access control policies requiring authentication before granting read, modify, or delete access to database contents, blocking unauthenticated remote attackers.
IA-8 mandates identification and authentication for non-organizational users or processes, such as remote attackers, ensuring the specific functionality requires credentials rather than allowing open access.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authentication in public-facing database system enables remote exploitation (T1190) for unauthorized database access, directly facilitating data collection from databases (T1213.006), stored data manipulation (T1565.001), and data destruction via deletion (T1485).
NVD Description
Police Statistics Database System developed by Gotac has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.
Deeper analysisAI
CVE-2026-1019 is a Missing Authentication vulnerability (CWE-306) in the Police Statistics Database System developed by Gotac. Published on 2026-01-16, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and lack of prerequisites. The flaw enables unauthenticated remote attackers to read, modify, and delete database contents through a specific functionality lacking proper authentication controls.
Any unauthenticated attacker with network access to the affected system can exploit this vulnerability without user interaction or privileges. Successful exploitation grants full read, write, and delete access to the database, potentially compromising sensitive police statistics data, altering records, or disrupting service availability.
Advisories from TWCERT/CC provide further details on this vulnerability, available at https://www.twcert.org.tw/en/cp-139-10638-0e44b-2.html and https://www.twcert.org.tw/tw/cp-132-10637-3e4b3-1.html. Practitioners should consult these for recommended mitigations, such as implementing authentication mechanisms or restricting access to the vulnerable functionality.
Details
- CWE(s)