CVE-2026-3323
Published: 28 April 2026
Summary
CVE-2026-3323 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Certvde (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 3.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-17 (Remote Access).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-14 directly identifies, authorizes, and controls any permitted actions without identification or authentication, preventing unauthenticated access to the unsecured configuration interface.
CM-6 establishes and enforces secure configuration settings that require authentication for sensitive interfaces, directly mitigating the misconfiguration exposing hashed credentials.
AC-17 authorizes, monitors, and controls remote access to systems, preventing unauthenticated remote attackers from exploiting the configuration interface.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability is unauthenticated remote access to a configuration interface exposing sensitive data (incl. hashed credentials), directly enabling T1190 (Exploit Public-Facing Application) and facilitating T1552 (Unsecured Credentials).
NVD Description
An unsecured configuration interface on affected devices allows unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes.
Deeper analysisAI
CVE-2026-3323 is a vulnerability affecting an unsecured configuration interface on affected devices, enabling unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes. The issue, published on 2026-04-28T11:16:05.967, carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and maps to CWE-306 (Missing Authentication for Critical Function).
Unauthenticated attackers with network access can exploit this vulnerability due to its low attack complexity and lack of required privileges or user interaction. Exploitation grants high-impact confidentiality access to sensitive data like hashed credentials and access codes, without integrity or availability disruption.
Advisories detailing mitigations are available in VDE-2026-016 at https://certvde.com/en/advisories/VDE-2026-016 and the corresponding CSAF JSON at https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-016.json.
Details
- CWE(s)