CVE-2026-27689
Plain English Summary
AI-powered analysis for quick understanding
An attacker with regular user access can exploit this vulnerability by sending a request that causes the system to enter a long-running loop, which uses up too many resources and can make the system unavailable to other users. This requires the attacker to be authenticated and have network access to the system.
Technical Description
Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-control parameter. This triggers prolonged loop execution that consumes excessive system resources, potentially rendering the system unavailable. Successful exploitation results in a denial-of-service condition that impacts availability, while confidentiality and integrity remain unaffected.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 10, 2026
28 days ago
Last Modified
Mar 11, 2026
28 days ago