Cyber Posture

CVE-2026-23647

CriticalPublic PoC

Published: 17 February 2026

Published
17 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0036 58.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrative privileges, were found to have fixed, embedded passwords. An…

more

attacker with network access to exposed services such as SSH may authenticate using these credentials and gain unauthorized access to the system. Successful exploitation allows remote access with elevated privileges and may result in full system compromise.

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 directly and comprehensively addresses hard-coded credentials by requiring management of authenticators including changing defaults prior to use and protecting them from unauthorized disclosure.

prevent

SI-2 mandates identification, assessment, and timely remediation of flaws such as CVE-2026-23647 through software updates and configuration changes per vendor guidance.

prevent

AC-2 partially mitigates by requiring account management processes to authorize, monitor, and deactivate unnecessary privileged accounts with embedded passwords.

Security SummaryAI

CVE-2026-23647 is a critical vulnerability in Glory RBG-100 recycler systems that use the ISPK-08 software component. It stems from hard-coded operating system credentials on the underlying Linux system, where multiple local user accounts—including those with administrative privileges—have fixed, embedded passwords. Classified under CWE-798 (Use of Hard-coded Credentials), this flaw allows remote authentication without requiring legitimate user interaction.

Any attacker with network access to exposed services, such as SSH, can exploit the vulnerability by using the known credentials to authenticate. No special privileges, user interaction, or complex conditions are needed, enabling straightforward remote access with elevated privileges and potential full system compromise. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its high impact on confidentiality, integrity, and availability.

Mitigation guidance is available in advisories from VulnCheck at https://www.vulncheck.com/advisories/glory-rbg-100-recycler-system-hard-coded-os-credentials and the vendor Glory Global at https://www.glory-global.com/. The CVE was published on 2026-02-17T17:21:05.040.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1133 External Remote Services Persistence
Adversaries may leverage external-facing remote services to initially access and/or persist within a network.
Why these techniques?

Hard-coded credentials in local accounts, including administrative ones, enable use of default accounts (T1078.001) for unauthorized remote access via exposed external remote services such as SSH (T1133).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References