CVE-2026-23647
Published: 17 February 2026
Description
Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrative privileges, were found to have fixed, embedded passwords. An…
more
attacker with network access to exposed services such as SSH may authenticate using these credentials and gain unauthorized access to the system. Successful exploitation allows remote access with elevated privileges and may result in full system compromise.
Mitigating Controls (NIST 800-53 r5)AI
IA-5 directly and comprehensively addresses hard-coded credentials by requiring management of authenticators including changing defaults prior to use and protecting them from unauthorized disclosure.
SI-2 mandates identification, assessment, and timely remediation of flaws such as CVE-2026-23647 through software updates and configuration changes per vendor guidance.
AC-2 partially mitigates by requiring account management processes to authorize, monitor, and deactivate unnecessary privileged accounts with embedded passwords.
Security SummaryAI
CVE-2026-23647 is a critical vulnerability in Glory RBG-100 recycler systems that use the ISPK-08 software component. It stems from hard-coded operating system credentials on the underlying Linux system, where multiple local user accounts—including those with administrative privileges—have fixed, embedded passwords. Classified under CWE-798 (Use of Hard-coded Credentials), this flaw allows remote authentication without requiring legitimate user interaction.
Any attacker with network access to exposed services, such as SSH, can exploit the vulnerability by using the known credentials to authenticate. No special privileges, user interaction, or complex conditions are needed, enabling straightforward remote access with elevated privileges and potential full system compromise. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its high impact on confidentiality, integrity, and availability.
Mitigation guidance is available in advisories from VulnCheck at https://www.vulncheck.com/advisories/glory-rbg-100-recycler-system-hard-coded-os-credentials and the vendor Glory Global at https://www.glory-global.com/. The CVE was published on 2026-02-17T17:21:05.040.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Hard-coded credentials in local accounts, including administrative ones, enable use of default accounts (T1078.001) for unauthorized remote access via exposed external remote services such as SSH (T1133).