Impact
The vulnerability allows an attacker who is not authenticated to modify the server’s configuration file in DRC Central Office Services (COS). This flaw can enable mass data exfiltration, interception of malicious traffic, or disruption of testing services. The flaw represents a weakness in access control, equivalent to an improper authorization issue that undermines confidentiality and integrity of the system’s configuration.
Affected Systems
Data Recognition Corporation’s Central Office Services – Content Hosting Component. No specific version information is provided, so any installation of this component is potentially impacted.
Risk and Exploitability
The vulnerability is likely exploitable via network channels that grant write access to configuration files, given the lack of authentication requirements. With no EPSS score and no listing in CISA’s KEV catalog, the exact exploit probability is unknown; however, the absence of authentication suggests a high risk if left unmitigated. No CVSS score is available, so the severity remains undetermined. Potential attackers could alter service parameters, potentially redirect traffic or exfiltrate data, making this a high‑impact vulnerability if exploited.
OpenCVE Enrichment