Description
Unauthenticated Configuration File Modification Vulnerability in DRC Central Office Services (COS) allows an attacker to modify the server's configuration file, potentially leading to mass data exfiltration, malicious traffic interception, or disruption of testing services.
Published: 2026-04-14
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized configuration modification enabling data exfiltration and traffic interception
Action: Apply Patch
AI Analysis

Impact

The vulnerability allows an attacker who is not authenticated to modify the server’s configuration file in DRC Central Office Services (COS). This flaw can enable mass data exfiltration, interception of malicious traffic, or disruption of testing services. The flaw represents a weakness in access control, equivalent to an improper authorization issue that undermines confidentiality and integrity of the system’s configuration.

Affected Systems

Data Recognition Corporation’s Central Office Services – Content Hosting Component. No specific version information is provided, so any installation of this component is potentially impacted.

Risk and Exploitability

The vulnerability is likely exploitable via network channels that grant write access to configuration files, given the lack of authentication requirements. With an EPSS score of less than 1% and no listing in CISA’s KEV catalog, the exact exploit probability is low but non-zero; however, the absence of authentication suggests a significant risk if left unmitigated. A CVSS score of 7.5 indicates high severity. Potential attackers could alter service parameters, potentially redirect traffic or exfiltrate data, making this a high‑impact vulnerability if exploited.

Generated by OpenCVE AI on April 17, 2026 at 08:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor patch or update to the affected component, or upgrade to a version that addresses the unauthenticated configuration modification flaw.
  • Restrict network access to the configuration files by implementing firewall rules or network segmentation, ensuring only trusted administrators can reach the COS management interface.
  • Enable detailed logging for configuration changes and monitor file integrity to detect any unauthorized modifications, performing regular security audits of the COS environment.

Generated by OpenCVE AI on April 17, 2026 at 08:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
References

Fri, 17 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Apr 2026 13:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Data Recognition Corporation
Data Recognition Corporation central Office Services - Content Hosting Component
Vendors & Products Data Recognition Corporation
Data Recognition Corporation central Office Services - Content Hosting Component

Wed, 15 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
CWE-862

Tue, 14 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Description Unauthenticated Configuration File Modification Vulnerability in DRC Central Office Services (COS) allows an attacker to modify the server's configuration file, potentially leading to mass data exfiltration, malicious traffic interception, or disruption of testing services.
Title Unauthenticated Configuration File Modification Vulnerability in DRC Central Office Services (COS)
References

Subscriptions

Data Recognition Corporation Central Office Services - Content Hosting Component
cve-icon MITRE

Status: PUBLISHED

Assigner: certcc

Published:

Updated: 2026-04-23T13:33:37.216Z

Reserved: 2026-04-07T16:42:45.597Z

Link: CVE-2026-5756

cve-icon Vulnrichment

Updated: 2026-04-23T13:33:37.216Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-14T18:17:39.600

Modified: 2026-04-23T14:16:04.840

Link: CVE-2026-5756

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T09:00:10Z

Weaknesses