CVE-2026-1019
Published: 16 January 2026
Description
Police Statistics Database System developed by Gotac has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to read, modify, and delete database contents by using a specific functionality.
Mitigating Controls (NIST 800-53 r5)AI
AC-14 explicitly limits and documents permitted actions without identification or authentication, directly preventing exploitation of functionalities like the vulnerable endpoint that allows unauthenticated database access.
AC-3 enforces approved access control policies requiring authentication before granting read, modify, or delete access to database contents, blocking unauthenticated remote attackers.
IA-8 mandates identification and authentication for non-organizational users or processes, such as remote attackers, ensuring the specific functionality requires credentials rather than allowing open access.
Security SummaryAI
CVE-2026-1019 is a Missing Authentication vulnerability (CWE-306) in the Police Statistics Database System developed by Gotac. Published on 2026-01-16, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and lack of prerequisites. The flaw enables unauthenticated remote attackers to read, modify, and delete database contents through a specific functionality lacking proper authentication controls.
Any unauthenticated attacker with network access to the affected system can exploit this vulnerability without user interaction or privileges. Successful exploitation grants full read, write, and delete access to the database, potentially compromising sensitive police statistics data, altering records, or disrupting service availability.
Advisories from TWCERT/CC provide further details on this vulnerability, available at https://www.twcert.org.tw/en/cp-139-10638-0e44b-2.html and https://www.twcert.org.tw/tw/cp-132-10637-3e4b3-1.html. Practitioners should consult these for recommended mitigations, such as implementing authentication mechanisms or restricting access to the vulnerable functionality.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authentication in public-facing database system enables remote exploitation (T1190) for unauthorized database access, directly facilitating data collection from databases (T1213.006), stored data manipulation (T1565.001), and data destruction via deletion (T1485).