Cyber Posture

CVE-2026-32968

CriticalRCE

Published: 23 March 2026

Published
23 March 2026
Modified
23 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0016 36.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32968 is a critical-severity OS Command Injection (CWE-78) vulnerability in Certvde (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 36.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 directly remediates the specific RCE flaw in the com_mb24sysapi module caused by improper OS command neutralization, preventing exploitation.

prevent

SI-10 enforces information input validation at interfaces, directly countering the CWE-78 improper neutralization of special elements used in OS commands.

preventdetect

SC-7 monitors and controls external communications, mitigating remote unauthenticated exploitation attempts over the network.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2026-32968 is an unauthenticated remote code execution vulnerability in a public-facing web application module via OS command injection (CWE-78), directly enabling exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Due to the improper neutralisation of special elements used in an OS command, an unauthenticated remote attacker can exploit an RCE vulnerability in the com_mb24sysapi module, resulting in full system compromise. This vulnerability is a variant attack for CVE-2020-10383.

Deeper analysisAI

CVE-2026-32968 is a remote code execution (RCE) vulnerability caused by improper neutralization of special elements used in an OS command (CWE-78) within the com_mb24sysapi module. Published on 2026-03-23, it has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.

An unauthenticated remote attacker can exploit this vulnerability over the network with low complexity and no user interaction or privileges required. Successful exploitation results in full system compromise, granting high levels of confidentiality, integrity, and availability impacts.

Advisories from CERT VDE provide further details on the vulnerability at https://certvde.com/de/advisories/VDE-2026-024 and https://certvde.com/de/advisories/VDE-2026-025.

This issue is described as a variant attack for CVE-2020-10383.

Details

CWE(s)

Affected Products

Certvde
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-23702Shared CWE-78
CVE-2024-50603Shared CWE-78
CVE-2022-50919Shared CWE-78
CVE-2026-4631Shared CWE-78
CVE-2024-57687Shared CWE-78
CVE-2023-54339Shared CWE-78
CVE-2024-49601Shared CWE-78
CVE-2026-34387Shared CWE-78
CVE-2025-51958Shared CWE-78
CVE-2025-43984Shared CWE-78

References