CVE-2026-1364
Published: 23 January 2026
Summary
CVE-2026-1364 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Org (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-14 directly identifies and restricts system administrative functionalities accessible without identification or authentication, preventing unauthenticated remote exploitation.
IA-8 requires unique identification and authentication for non-organizational users, blocking unauthenticated remote attackers from operating administrative functions.
AC-3 enforces approved access control policies, ensuring authentication is required before allowing administrative operations on the system.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authentication (CWE-306) in network-accessible software directly enables unauthenticated remote exploitation of admin functions, mapping to T1190.
NVD Description
IAQS and I6 developed by JNC has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to directly operate system administrative functionalities.
Deeper analysisAI
CVE-2026-1364 is a Missing Authentication vulnerability (CWE-306) in IAQS and I6, software developed by JNC. Published on 2026-01-23, it enables unauthenticated remote attackers to directly operate system administrative functionalities. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting critical severity due to its network accessibility, low complexity, lack of required privileges or user interaction, and high impacts across confidentiality, integrity, and availability.
Unauthenticated remote attackers can exploit this vulnerability over the network with no prerequisites. Exploitation allows them to perform administrative operations on affected systems, potentially resulting in full compromise, including unauthorized access to sensitive data, system modifications, and service disruptions.
Advisories from TWCERT/CC provide further details on this vulnerability, available at https://www.twcert.org.tw/en/cp-139-10653-117a1-2.html and https://www.twcert.org.tw/tw/cp-132-10652-4cdca-1.html. Security practitioners should consult these for recommended mitigations, such as applying patches or implementing authentication controls.
Details
- CWE(s)