Home

Description

Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrative privileges, were found to have fixed, embedded passwords. An attacker with network access to exposed services such as SSH may authenticate using these credentials and gain unauthorized access to the system. Successful exploitation allows remote access with elevated privileges and may result in full system compromise.

PUBLISHED Reserved 2026-01-14 | Published 2026-02-17 | Updated 2026-02-18 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-798 Use of Hard-coded Credentials

Product status

Default status
unknown

Any version
affected

Credits

Victor A. Morales, Senior Pentester Team Leader, GM Sectec, Corp. finder

Omar Crespo, Pentester, GM Sectec, Corp. finder

VulnCheck coordinator

References

www.glory-global.com/ product

www.vulncheck.com/...cycler-system-hard-coded-os-credentials third-party-advisory

cve.org (CVE-2026-23647)

nvd.nist.gov (CVE-2026-23647)

Download JSON