Description
Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby escalating privileges.
Published: 2026-03-24
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Contact Vendor
AI Analysis

Impact

Vitals ESP, developed by Galaxy Software Services, contains an incorrect authorization flaw that permits an authenticated remote attacker to perform certain administrative functions that are normally reserved for privileged users. The vulnerability is classified as an access‑control bypass (CWE‑863) and could allow an attacker to modify sensitive data, alter system settings, or otherwise gain elevated control within the application. The official CVSS score of 8.7 indicates a high potential impact on confidentiality, integrity, and availability once privilege escalation is achieved.

Affected Systems

The affected product is Galaxy Software Services Vitals ESP. No specific version information is provided in the report, so any deployed instance of Vitals ESP remains potentially vulnerable until a vendor patch is applied.

Risk and Exploitability

Based on the description, it is inferred that the attack requires an authenticated remote session, meaning that only users with valid credentials or compromised accounts can exploit the flaw. The high CVSS score signals that, once accessed, the attacker can dramatically elevate privileges. Although the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, the lack of publicly known exploits does not reduce the risk; an attacker with legitimate credentials could readily abuse the vulnerability in a timely manner.

Generated by OpenCVE AI on March 24, 2026 at 06:51 UTC.

Remediation

Vendor Solution

Contact the vendor to obtain the patch.


OpenCVE Recommended Actions

  • Contact Galaxy Software Services to request the official patch for Vitals ESP.
  • Apply the vendor-provided patch immediately once it is available.
  • Verify that the applied patch resolves the incorrect authorization issue.
  • Restrict administrative privileges to the minimum set of users necessary for operations.
  • Monitor system logs for signs of unauthorized administrative activity until the patch is deployed.

Generated by OpenCVE AI on March 24, 2026 at 06:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Gss
Gss vitalsesp
CPEs cpe:2.3:a:gss:vitalsesp:*:*:*:*:*:*:*:*
Vendors & Products Gss
Gss vitalsesp

Tue, 24 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Galaxy Software Services Corporation
Galaxy Software Services Corporation vitals Esp
Vendors & Products Galaxy Software Services Corporation
Galaxy Software Services Corporation vitals Esp

Tue, 24 Mar 2026 05:15:00 +0000

Type Values Removed Values Added
Description Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby escalating privileges.
Title Galaxy Software Services|Vitals ESP - Incorrect Authorization
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Galaxy Software Services Corporation Vitals Esp
Gss Vitalsesp
cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2026-03-24T14:35:48.182Z

Reserved: 2026-03-23T10:47:13.571Z

Link: CVE-2026-4639

cve-icon Vulnrichment

Updated: 2026-03-24T14:35:38.380Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T05:16:25.167

Modified: 2026-04-15T16:29:24.373

Link: CVE-2026-4639

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:40:09Z

Weaknesses