CVE-2026-4640
Published: 24 March 2026
Summary
CVE-2026-4640 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Gss Vitalsesp. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly identifies, authorizes, documents, and reviews actions permitted without identification or authentication, preventing exploitation of missing authentication for sensitive functions.
Requires unique identification and authentication for non-organizational users, blocking unauthenticated remote access to vulnerable functions.
Enforces approved authorizations for logical access to system resources, ensuring authentication checks are implemented to mitigate missing authentication vulnerabilities.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authentication (CWE-306) in a network-accessible service directly enables remote unauthenticated exploitation of a public-facing application to retrieve sensitive information, matching T1190.
NVD Description
Vitals ESP developed by Galaxy Software Services has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to execute certain functions to obtain sensitive information.
Deeper analysisAI
CVE-2026-4640 is a Missing Authentication vulnerability (CWE-306) in Vitals ESP, a product developed by Galaxy Software Services. Published on 2026-03-24, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to its potential for significant confidentiality impact over the network with low complexity and no privileges required. The flaw enables unauthenticated remote attackers to execute specific functions without proper authentication checks.
Unauthenticated attackers with network access can exploit this vulnerability remotely by invoking the affected functions directly. Successful exploitation allows them to obtain sensitive information, though it does not impact integrity or availability.
Mitigation guidance and additional details are provided in advisories from TWCERT/CC, accessible at https://www.twcert.org.tw/en/cp-139-10795-25784-2.html and https://www.twcert.org.tw/tw/cp-132-10794-704a2-1.html. Security practitioners should consult these for vendor-recommended patches or workarounds.
Details
- CWE(s)