Cyber Posture

CVE-2026-23647

CriticalPublic PoC

Published: 17 February 2026

Published
17 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0036 58.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23647 is a critical-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Glory Global (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked in the top 41.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Default Accounts (T1078.001) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 directly and comprehensively addresses hard-coded credentials by requiring management of authenticators including changing defaults prior to use and protecting them from unauthorized disclosure.

prevent

SI-2 mandates identification, assessment, and timely remediation of flaws such as CVE-2026-23647 through software updates and configuration changes per vendor guidance.

prevent

AC-2 partially mitigates by requiring account management processes to authorize, monitor, and deactivate unnecessary privileged accounts with embedded passwords.

MITRE ATT&CK Enterprise TechniquesAI

T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1133 External Remote Services Persistence
Adversaries may leverage external-facing remote services to initially access and/or persist within a network.
Why these techniques?

Hard-coded credentials in local accounts, including administrative ones, enable use of default accounts (T1078.001) for unauthorized remote access via exposed external remote services such as SSH (T1133).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrative privileges, were found to have fixed, embedded passwords. An…

more

attacker with network access to exposed services such as SSH may authenticate using these credentials and gain unauthorized access to the system. Successful exploitation allows remote access with elevated privileges and may result in full system compromise.

Deeper analysisAI

CVE-2026-23647 is a critical vulnerability in Glory RBG-100 recycler systems that use the ISPK-08 software component. It stems from hard-coded operating system credentials on the underlying Linux system, where multiple local user accounts—including those with administrative privileges—have fixed, embedded passwords. Classified under CWE-798 (Use of Hard-coded Credentials), this flaw allows remote authentication without requiring legitimate user interaction.

Any attacker with network access to exposed services, such as SSH, can exploit the vulnerability by using the known credentials to authenticate. No special privileges, user interaction, or complex conditions are needed, enabling straightforward remote access with elevated privileges and potential full system compromise. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its high impact on confidentiality, integrity, and availability.

Mitigation guidance is available in advisories from VulnCheck at https://www.vulncheck.com/advisories/glory-rbg-100-recycler-system-hard-coded-os-credentials and the vendor Glory Global at https://www.glory-global.com/. The CVE was published on 2026-02-17T17:21:05.040.

Details

CWE(s)

Affected Products

Glory Global
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2024-46429Shared CWE-798
CVE-2026-28777Shared CWE-798
CVE-2020-37092Shared CWE-798
CVE-2024-46436Shared CWE-798
CVE-2026-28776Shared CWE-798
CVE-2021-47796Shared CWE-798
CVE-2024-48126Shared CWE-798
CVE-2025-35451Shared CWE-798
CVE-2026-27507Shared CWE-798
CVE-2026-28255Shared CWE-798

References