Description
Missing Authentication for Critical Function vulnerability in ePati Cyber ​​Security Technologies Inc. Antikor Next Generation Firewall (NGFW) allows Authentication Bypass.This issue affects Antikor Next Generation Firewall (NGFW): from v.2.0.1298 before v.2.0.1301.
Published: 2026-02-25
Score: 9.8 Critical
EPSS: 2.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A missing authentication check in a critical function of ePati Cyber Security Technologies' Antikor Next Generation Firewall allows an attacker to bypass login credentials and gain unrestricted access to the device's administrative interface. By exploiting this flaw, an attacker could potentially modify firewall configurations or perform other actions that an authenticated administrator would normally have permission to execute, thereby undermining the device’s intended security controls. The vulnerability therefore exposes the firewall to possible configuration changes and unauthorized use of administrative capabilities.

Affected Systems

ePati Cyber Security Technologies Inc. Antikor Next Generation Firewall (NGFW) versions 2.0.1298 through 2.0.1300 are affected. Versions 2.0.1301 and later contain the fix for the missing authentication issue.

Risk and Exploitability

The vulnerability is rated CVSS 9.8, indicating critical severity, and the EPSS score is approximately 2.6%, reflecting a low to moderate probability of exploitation. It is not listed in the CISA KEV catalog. The attack vector is inferred to be remote or local to management interfaces, as the flaw removes all authentication requirements. An attacker with access to the firewall management network can exploit it without needing valid credentials or social engineering, making the risk high for organizations that expose the management interfaces to broader networks.

Generated by OpenCVE AI on May 15, 2026 at 15:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official security patch by upgrading Antikor NGFW to version 2.0.1301 or newer.
  • Ensure all management interfaces require authentication and restrict public exposure to only trusted networks.
  • Implement network segmentation so that only authorized subnets can reach the firewall’s administrative ports.

Generated by OpenCVE AI on May 15, 2026 at 15:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Epati
Epati antikor Next Generation Firewall
CPEs cpe:2.3:o:epati:antikor_next_generation_firewall:*:*:*:*:*:*:*:*
Vendors & Products Epati
Epati antikor Next Generation Firewall

Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Epati Cyber ​​security Technologies
Epati Cyber ​​security Technologies antikor Next Generation Firewall
Vendors & Products Epati Cyber ​​security Technologies
Epati Cyber ​​security Technologies antikor Next Generation Firewall

Thu, 26 Feb 2026 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 13:00:00 +0000

Type Values Removed Values Added
Description Missing Authentication for Critical Function vulnerability in ePati Cyber ​​Security Technologies Inc. Antikor Next Generation Firewall (NGFW) allows Authentication Bypass.This issue affects Antikor Next Generation Firewall (NGFW): from v.2.0.1298 before v.2.0.1301.
Title Authentication Bypass in ePati's Antikor NGFW
Weaknesses CWE-306
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Epati Antikor Next Generation Firewall
Epati Cyber ​​security Technologies Antikor Next Generation Firewall
cve-icon MITRE

Status: PUBLISHED

Assigner: TR-CERT

Published:

Updated: 2026-02-25T15:12:39.466Z

Reserved: 2026-02-17T12:15:11.411Z

Link: CVE-2026-2624

cve-icon Vulnrichment

Updated: 2026-02-25T15:12:14.072Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T13:16:05.373

Modified: 2026-02-26T17:29:01.797

Link: CVE-2026-2624

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T15:15:46Z

Weaknesses