Description
A security flaw has been discovered in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This affects the function edit_pwd_mall of the file /fort/login/edit_pwd_mall. The manipulation of the argument flag results in weak password recovery. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-22
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Credential compromise via weak password recovery
Action: Immediate Patch
AI Analysis

Impact

A vulnerability in the Sangfor Operation and Maintenance Security Management System allows an attacker to manipulate the flag parameter in the edit_pwd_mall endpoint, resulting in a weak password recovery mechanism. The flaw is exploitable remotely and has an associated public exploit. If successfully leveraged, an attacker could reset a user’s password without proper authorization, potentially compromising any accounts that rely on that password.

Affected Systems

Sangfor Operation and Maintenance Security Management System versions up to and including 3.0.12 are affected.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium severity, with an EPSS score of less than 1% suggesting a low likelihood of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires only remote access to the vulnerable endpoint and manipulation of the flag argument, and the public exploit releases have demonstrated the feasibility of the attack in practice.

Generated by OpenCVE AI on April 18, 2026 at 03:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to a patched version of Sangfor Operation and Maintenance Security Management System (recommended if the vendor has released an fix).
  • Restrict access to the password recovery endpoint by limiting connections to trusted IP ranges and monitoring for abnormal activity.
  • If no patch is available, disable or lock the edit_pwd_mall functionality to prevent unauthorized password resets.

Generated by OpenCVE AI on April 18, 2026 at 03:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 30 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sangfor:operation_and_maintenance_security_management_system:*:*:*:*:*:*:*:*

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Sangfor
Sangfor operation And Maintenance Security Management System
Vendors & Products Sangfor
Sangfor operation And Maintenance Security Management System

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Sangfor Operation and Maintenance Security Management System up to 3.0.12. This affects the function edit_pwd_mall of the file /fort/login/edit_pwd_mall. The manipulation of the argument flag results in weak password recovery. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Sangfor Operation and Maintenance Security Management System edit_pwd_mall password recovery
Weaknesses CWE-640
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sangfor Operation And Maintenance Security Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:52:29.862Z

Reserved: 2026-01-22T07:40:49.061Z

Link: CVE-2026-1325

cve-icon Vulnrichment

Updated: 2026-01-22T20:20:30.187Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-22T15:16:50.610

Modified: 2026-01-30T16:37:09.393

Link: CVE-2026-1325

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T04:00:08Z

Weaknesses