Impact
The vulnerability allows an attacker to bypass the login process, granting unauthorized access to the application’s resources without needing valid credentials. This is a direct authentication bypass, classified under CWE‑288. The impact is loss of confidentiality and integrity of all data accessible through the system, as any authenticated function becomes available to an unauthenticated user.
Affected Systems
The affected product is Kaleris Yard Management System version 7.2.2.1. No other vendor or product variants are listed as impacted.
Risk and Exploitability
The CVSS score of 9.8 indicates a critical severity, and the EPSS score of less than 1% suggests lower current exploit prevalence, though the vulnerability remains easily exploitable without any complex prerequisites. Attackers likely target the exposed web login endpoint from external networks, as the bypass occurs during the authentication stage. The vulnerability is not listed in the CISA KEV catalog, but its high score warrants immediate attention.
OpenCVE Enrichment