CVE-2026-23647
Published: 17 February 2026
Summary
CVE-2026-23647 is a critical-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Glory Global (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked in the top 41.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
IA-5 directly and comprehensively addresses hard-coded credentials by requiring management of authenticators including changing defaults prior to use and protecting them from unauthorized disclosure.
SI-2 mandates identification, assessment, and timely remediation of flaws such as CVE-2026-23647 through software updates and configuration changes per vendor guidance.
AC-2 partially mitigates by requiring account management processes to authorize, monitor, and deactivate unnecessary privileged accounts with embedded passwords.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hard-coded credentials in local accounts, including administrative ones, enable use of default accounts (T1078.001) for unauthorized remote access via exposed external remote services such as SSH (T1133).
NVD Description
Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrative privileges, were found to have fixed, embedded passwords. An…
more
attacker with network access to exposed services such as SSH may authenticate using these credentials and gain unauthorized access to the system. Successful exploitation allows remote access with elevated privileges and may result in full system compromise.
Deeper analysisAI
CVE-2026-23647 is a critical vulnerability in Glory RBG-100 recycler systems that use the ISPK-08 software component. It stems from hard-coded operating system credentials on the underlying Linux system, where multiple local user accounts—including those with administrative privileges—have fixed, embedded passwords. Classified under CWE-798 (Use of Hard-coded Credentials), this flaw allows remote authentication without requiring legitimate user interaction.
Any attacker with network access to exposed services, such as SSH, can exploit the vulnerability by using the known credentials to authenticate. No special privileges, user interaction, or complex conditions are needed, enabling straightforward remote access with elevated privileges and potential full system compromise. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its high impact on confidentiality, integrity, and availability.
Mitigation guidance is available in advisories from VulnCheck at https://www.vulncheck.com/advisories/glory-rbg-100-recycler-system-hard-coded-os-credentials and the vendor Glory Global at https://www.glory-global.com/. The CVE was published on 2026-02-17T17:21:05.040.
Details
- CWE(s)