Description
ALGO 8180 IP Audio Alerter Web UI Inclusion of Authentication Cookie in Response Body Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of ALGO 8180 IP Audio Alerter devices. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the web-based user interface. The issue results from the lack of proper management of sensitive information. An attacker can leverage this vulnerability to disclose information in the context of the device. Was ZDI-CAN-28297.
Published: 2026-01-23
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

The flaw arises from the web UI in ALGO 8180 IP Audio Alerter devices, where an authentication cookie is embedded directly in the body of HTTP responses. This oversight allows a remote attacker, without needing any credentials, to retrieve the cookie, which based on the nature of the cookie could potentially be used for session hijacking or to expose other sensitive data; this is inferred from the description. The vulnerability enables disclosure of confidential device information, violating confidentiality, and is classified as CWE‑200 information disclosure.

Affected Systems

The vulnerability affects ALGO 8180 IP Audio Alerter hardware with firmware version 5.5; impact on later versions is unconfirmed. The CPE identifiers confirm that the firmware 5.5 is impacted. Organizations operating these devices, especially in public or unprotected networks, are at risk.

Risk and Exploitability

The CVSS score of 7.5 classifies it as high severity, while the EPSS score of less than 1% indicates a low probability of exploitation at present. It is not listed in the KEV catalog, suggesting no known active exploitation. The attack can be performed over the network by sending a request to the web interface; no authentication is required. It is inferred that the high severity combined with the low exploitation likelihood would place the threat at a moderate to high risk for organizations using vulnerable devices, especially those exposing the web UI to the Internet.

Generated by OpenCVE AI on April 18, 2026 at 18:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the latest firmware release or vendor patch that removes the cookie from response bodies, thereby mitigating the CWE‑200 information disclosure.
  • Restrict network access to the device’s web interface using a firewall or network segmentation so that only trusted networks can reach it.
  • Disable or remove the web UI if it is not needed, or enable HTTPS with HSTS and secure cookie flags to prevent cookie leakage.

Generated by OpenCVE AI on April 18, 2026 at 18:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Algosolutions
Algosolutions 8180 Ip Audio Alerter
Algosolutions 8180 Ip Audio Alerter Firmware
CPEs cpe:2.3:h:algosolutions:8180_ip_audio_alerter:-:*:*:*:*:*:*:*
cpe:2.3:o:algosolutions:8180_ip_audio_alerter_firmware:5.5:*:*:*:*:*:*:*
Vendors & Products Algosolutions
Algosolutions 8180 Ip Audio Alerter
Algosolutions 8180 Ip Audio Alerter Firmware
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Fri, 23 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Algo
Algo 8180 Ip Audio Alerter
Vendors & Products Algo
Algo 8180 Ip Audio Alerter

Fri, 23 Jan 2026 03:30:00 +0000

Type Values Removed Values Added
Description ALGO 8180 IP Audio Alerter Web UI Inclusion of Authentication Cookie in Response Body Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of ALGO 8180 IP Audio Alerter devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web-based user interface. The issue results from the lack of proper management of sensitive information. An attacker can leverage this vulnerability to disclose information in the context of the device. Was ZDI-CAN-28297.
Title ALGO 8180 IP Audio Alerter Web UI Inclusion of Authentication Cookie in Response Body Information Disclosure Vulnerability
Weaknesses CWE-200
References
Metrics cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Algo 8180 Ip Audio Alerter
Algosolutions 8180 Ip Audio Alerter 8180 Ip Audio Alerter Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-01-23T19:39:25.056Z

Reserved: 2026-01-08T22:55:36.577Z

Link: CVE-2026-0789

cve-icon Vulnrichment

Updated: 2026-01-23T19:39:21.693Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-23T04:16:06.580

Modified: 2026-02-13T21:09:50.240

Link: CVE-2026-0789

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:00:08Z

Weaknesses