Cyber Posture

CVE-2026-2999

Critical

Published: 02 March 2026

Published
02 March 2026
Modified
09 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 24.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2026-2999 is a Remote Code Execution vulnerability affecting the IDExpert Windows Logon Agent developed by Changing. Published on 2026-03-02T07:16:22.743, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-494. The flaw enables unauthenticated remote attackers to force affected systems to download arbitrary executable files from a remote source and execute them.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity, requiring no privileges or user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, allowing arbitrary code execution on the target system.

Mitigation details are outlined in advisories from the vendor at https://www.changingtec.com/news_detail.jsp?item_id=348 and from TWCERT at https://www.twcert.org.tw/en/cp-139-10741-daed4-2.html and https://www.twcert.org.tw/tw/cp-132-10740-b2eb2-1.html.

Details

CWE(s)
CWE-494

Affected Products

changingtec
idexpert
2.7.3.230719 — 2.8.4.250925

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated remote code execution vulnerability in a network-exposed Windows service (Logon Agent) enables exploitation of a public-facing application to download and execute arbitrary code.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References