Cyber Posture

CVE-2026-3323

High

Published: 28 April 2026

Published
28 April 2026
Modified
28 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0002 3.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-3323 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Certvde (inferred from references). Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 3.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-17 (Remote Access).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-14 directly identifies, authorizes, and controls any permitted actions without identification or authentication, preventing unauthenticated access to the unsecured configuration interface.

prevent

CM-6 establishes and enforces secure configuration settings that require authentication for sensitive interfaces, directly mitigating the misconfiguration exposing hashed credentials.

prevent

AC-17 authorizes, monitors, and controls remote access to systems, preventing unauthenticated remote attackers from exploiting the configuration interface.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Vulnerability is unauthenticated remote access to a configuration interface exposing sensitive data (incl. hashed credentials), directly enabling T1190 (Exploit Public-Facing Application) and facilitating T1552 (Unsecured Credentials).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

An unsecured configuration interface on affected devices allows unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes.

Deeper analysisAI

CVE-2026-3323 is a vulnerability affecting an unsecured configuration interface on affected devices, enabling unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes. The issue, published on 2026-04-28T11:16:05.967, carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and maps to CWE-306 (Missing Authentication for Critical Function).

Unauthenticated attackers with network access can exploit this vulnerability due to its low attack complexity and lack of required privileges or user interaction. Exploitation grants high-impact confidentiality access to sensitive data like hashed credentials and access codes, without integrity or availability disruption.

Advisories detailing mitigations are available in VDE-2026-016 at https://certvde.com/en/advisories/VDE-2026-016 and the corresponding CSAF JSON at https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-016.json.

Details

CWE(s)

Affected Products

Certvde
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-53118Shared CWE-306
CVE-2026-30846Shared CWE-306
CVE-2026-1453Shared CWE-306
CVE-2026-31882Shared CWE-306
CVE-2025-27642Shared CWE-306
CVE-2021-47891Shared CWE-306
CVE-2026-26340Shared CWE-306
CVE-2025-3498Shared CWE-306
CVE-2025-52665Shared CWE-306
CVE-2025-0355Shared CWE-306

References