CVE-2026-2414
Published: 25 March 2026
Summary
CVE-2026-2414 is a critical-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability in Hypr Hypr. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 17.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to system resources, directly preventing authorization bypass via user-controlled keys that enable privilege escalation.
Validates the correctness of user-controlled inputs like keys, blocking manipulation that leads to authorization bypass and privilege escalation.
Limits user and process privileges to the minimum necessary, reducing the potential impact and scope of privilege escalation even if a bypass occurs.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authorization bypass on public-facing HYPR Server directly enables remote unauthenticated exploitation (T1190) leading to privilege escalation (T1068).
NVD Description
Authorization bypass through User-Controlled key vulnerability in HYPR Server allows Privilege Escalation.This issue affects Server: from 9.5.2 before 10.7.2.
Deeper analysisAI
CVE-2026-2414 is an authorization bypass vulnerability caused by a user-controlled key in the HYPR Server, enabling privilege escalation. The issue affects HYPR Server versions from 9.5.2 up to but not including 10.7.2.
With a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), the vulnerability is exploitable remotely over the network by unauthenticated attackers with low complexity and no user interaction required. Successful exploitation allows attackers to achieve high-impact disruption to confidentiality, integrity, and availability through privilege escalation.
Mitigation details are available in the vendor's security advisory at https://www.hypr.com/trust-center/security-advisories. The vulnerability is addressed in HYPR Server version 10.7.2 and later.
Details
- CWE(s)