CVE-2026-1363
Published: 23 January 2026
Summary
CVE-2026-1363 is a critical-severity Use of Client-Side Authentication (CWE-603) vulnerability in Org (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 15.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces server-side access control policies, directly preventing client-side manipulation from bypassing server-side security to gain administrator privileges.
Requires server-side validation of all inputs from the web front-end, blocking manipulated data that could elevate privileges.
Limits privileges to the least necessary, reducing the impact of unauthorized administrator privilege escalation even if partially bypassed.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote exploitation of public-facing web app (T1190) to achieve unauthorized admin privileges via client-side bypass (T1068).
NVD Description
IAQS and I6 developed by JNC has a Client-Side Enforcement of Server-Side Security vulnerability, allowing unauthenticated remote attackers to gain administrator privileges by manipulating the web front-end.
Deeper analysisAI
CVE-2026-1363 is a Client-Side Enforcement of Server-Side Security vulnerability (CWE-603) affecting IAQS and I6, software products developed by JNC. The flaw occurs in the web front-end, where server-side security measures are improperly enforced on the client side, enabling manipulation that bypasses intended protections. Published on 2026-01-23, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting critical severity due to high impacts on confidentiality, integrity, and availability.
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no privileges or user interaction required. By manipulating the web front-end, attackers can gain administrator privileges on affected systems.
Advisories from TWCERT/CC provide further details on this vulnerability, available at https://www.twcert.org.tw/en/cp-139-10653-117a1-2.html and https://www.twcert.org.tw/tw/cp-132-10652-4cdca-1.html.
Details
- CWE(s)