Cyber Posture

CVE-2026-1019

Critical

Published: 16 January 2026

Published
16 January 2026
Modified
23 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 28.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Police Statistics Database System developed by Gotac has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-14 explicitly limits and documents permitted actions without identification or authentication, directly preventing exploitation of functionalities like the vulnerable endpoint that allows unauthenticated database access.

prevent

AC-3 enforces approved access control policies requiring authentication before granting read, modify, or delete access to database contents, blocking unauthenticated remote attackers.

prevent

IA-8 mandates identification and authentication for non-organizational users or processes, such as remote attackers, ensuring the specific functionality requires credentials rather than allowing open access.

Security SummaryAI

CVE-2026-1019 is a Missing Authentication vulnerability (CWE-306) in the Police Statistics Database System developed by Gotac. Published on 2026-01-16, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and lack of prerequisites. The flaw enables unauthenticated remote attackers to read, modify, and delete database contents through a specific functionality lacking proper authentication controls.

Any unauthenticated attacker with network access to the affected system can exploit this vulnerability without user interaction or privileges. Successful exploitation grants full read, write, and delete access to the database, potentially compromising sensitive police statistics data, altering records, or disrupting service availability.

Advisories from TWCERT/CC provide further details on this vulnerability, available at https://www.twcert.org.tw/en/cp-139-10638-0e44b-2.html and https://www.twcert.org.tw/tw/cp-132-10637-3e4b3-1.html. Practitioners should consult these for recommended mitigations, such as implementing authentication mechanisms or restricting access to the vulnerable functionality.

Details

CWE(s)

Affected Products

gotac
police statistics database system
≤ 1.0.3

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
Why these techniques?

Missing authentication in public-facing database system enables remote exploitation (T1190) for unauthorized database access, directly facilitating data collection from databases (T1213.006), stored data manipulation (T1565.001), and data destruction via deletion (T1485).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References