Cyber Posture

CVE-2026-23662

High

Published: 10 March 2026

Published
10 March 2026
Modified
12 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0008 24.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23662 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Microsoft Azure Iot Explorer. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-306 CWE-319

Mandating that external services employ specified authentication controls and ongoing compliance monitoring makes missing authentication for critical functions harder to overlook or exploit.

addresses: CWE-306 CWE-319

Requiring authorization before VoIP deployment prevents critical VoIP functions (registration, call setup) from lacking authentication.

addresses: CWE-306

Requires established identification and authentication to unlock, mitigating missing authentication for continued system access.

addresses: CWE-306

Requiring identification and rationale for actions allowed without authentication ensures critical functions are not left unprotected by forcing review of authentication requirements.

addresses: CWE-306

Authorizing mobile device connections to organizational systems ensures authentication is performed for this critical access function.

addresses: CWE-306

Guarantees critical functions are protected by mandatory invocation of the access control mechanism.

addresses: CWE-319

Role-based training covers secure transmission methods, mitigating cleartext transmission of sensitive data.

addresses: CWE-306

Auditing sessions makes it possible to detect access to critical functions without required authentication.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Missing authentication (CWE-306) for a remotely accessible critical function in Azure IoT Explorer directly enables unauthenticated exploitation of a public-facing application, resulting in sensitive information disclosure.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Missing authentication for critical function in Azure IoT Explorer allows an unauthorized attacker to disclose information over a network.

Deeper analysisAI

CVE-2026-23662 is a missing authentication vulnerability affecting a critical function in Azure IoT Explorer. This flaw, associated with CWE-306 (Missing Authentication for Critical Function) and CWE-319 (Cleartext Transmission of Sensitive Information), enables unauthorized information disclosure over a network. The vulnerability received a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to its network accessibility, low complexity, and lack of required privileges or user interaction.

An unauthorized attacker can exploit this vulnerability remotely without authentication by accessing the unprotected critical function in Azure IoT Explorer. Successful exploitation results in high-impact confidentiality loss, allowing the attacker to disclose sensitive information transmitted in cleartext over the network, while integrity and availability remain unaffected.

Microsoft's security response center advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23662 details recommended mitigations and available patches for addressing this vulnerability in Azure IoT Explorer. Security practitioners should consult this guide for deployment instructions and verify system updates.

Details

CWE(s)

Affected Products

microsoft
azure iot explorer
≤ 0.15.13

CVEs Like This One

CVE-2026-26121Same product: Microsoft Azure Iot Explorer
CVE-2026-23664Same product: Microsoft Azure Iot Explorer
CVE-2026-23661Same product: Microsoft Azure Iot Explorer
CVE-2025-21355Same vendor: Microsoft
CVE-2026-20856Same vendor: Microsoft
CVE-2025-21385Same vendor: Microsoft
CVE-2025-24043Same vendor: Microsoft
CVE-2025-49706Same vendor: Microsoft
CVE-2025-53770Same vendor: Microsoft
CVE-2026-26106Same vendor: Microsoft

References