Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-6805

Summary
Assigner-THA-PSIRT
Assigner Org ID-9d5917ae-205d-4ae5-8749-1f49479b1395
Published At-07 May, 2026 | 09:45
Updated At-07 May, 2026 | 13:39
Rejected At-
Credits

Vulnerability on Cryptobox external sharing feature

Vulnerability on the external sharing feature in Cryptobox allows an attacker knowing a sharing link URL to retrieve information from the server allowing an offline brute-force attack of the access code associated to this sharing link.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:THA-PSIRT
Assigner Org ID:9d5917ae-205d-4ae5-8749-1f49479b1395
Published At:07 May, 2026 | 09:45
Updated At:07 May, 2026 | 13:39
Rejected At:
▼CVE Numbering Authority (CNA)
Vulnerability on Cryptobox external sharing feature

Vulnerability on the external sharing feature in Cryptobox allows an attacker knowing a sharing link URL to retrieve information from the server allowing an offline brute-force attack of the access code associated to this sharing link.

Affected Products
Vendor
Ercom
Product
Cryptobox
Modules
  • Server
Default Status
affected
Versions
Unaffected
  • 4.40.183
  • From 4.37.248 before v4.38.0 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-280CWE-280 Improper handling of insufficient permissions or privileges
Type: CWE
CWE ID: CWE-280
Description: CWE-280 Improper handling of insufficient permissions or privileges
Metrics
VersionBase scoreBase severityVector
4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-49CAPEC-49 Password Brute Forcing
CAPEC ID: CAPEC-49
Description: CAPEC-49 Password Brute Forcing
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://info.cryptobox.com/doc/v4.40/4.40.en/
release-notes
Hyperlink: https://info.cryptobox.com/doc/v4.40/4.40.en/
Resource:
release-notes
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@thalesgroup.com
Published At:07 May, 2026 | 10:16
Updated At:11 May, 2026 | 16:37

Vulnerability on the external sharing feature in Cryptobox allows an attacker knowing a sharing link URL to retrieve information from the server allowing an offline brute-force attack of the access code associated to this sharing link.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CPE Matches

thalesgroup
thalesgroup
>>ercom_cryptobox>>Versions from 4.37.248(inclusive) to 4.38.0(exclusive)
cpe:2.3:a:thalesgroup:ercom_cryptobox:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-280Secondarypsirt@thalesgroup.com
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: CWE-280
Type: Secondary
Source: psirt@thalesgroup.com
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://info.cryptobox.com/doc/v4.40/4.40.en/psirt@thalesgroup.com
Release Notes
Hyperlink: https://info.cryptobox.com/doc/v4.40/4.40.en/
Source: psirt@thalesgroup.com
Resource:
Release Notes

Change History

0
Information is not available yet

Similar CVEs

4Records found

CVE-2023-27087
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.20% / 41.50%
||
7 Day CHG~0.00%
Published-21 Mar, 2023 | 00:00
Updated-26 Feb, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Permissions vulnerabiltiy found in Xuxueli xxl-job v2.2.0, v 2.3.0 and v.2.3.1 allows attacker to obtain sensitive information via the pageList parameter.

Action-Not Available
Vendor-xuxuelin/a
Product-xxl-jobn/a
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2024-1608
Matching Score-4
Assigner-OPPO Mobile Telecommunication Corp., Ltd.
ShareView Details
Matching Score-4
Assigner-OPPO Mobile Telecommunication Corp., Ltd.
CVSS Score-9.1||CRITICAL
EPSS-0.24% / 47.00%
||
7 Day CHG~0.00%
Published-20 Feb, 2024 | 09:09
Updated-02 Apr, 2025 | 20:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OPPO Usercenter Credit sdk

In OPPO Usercenter Credit SDK, there's a possible escalation of privilege due to loose permission check, This could lead to application internal information leak w/o user interaction.

Action-Not Available
Vendor-oppoOPPOoppo
Product-usercenter_credit_software_development_kitUsercenter Credit sdkusercenter_credit_sdk
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2025-58410
Matching Score-4
Assigner-Imagination Technologies
ShareView Details
Matching Score-4
Assigner-Imagination Technologies
CVSS Score-7.5||HIGH
EPSS-0.05% / 16.34%
||
7 Day CHG~0.00%
Published-17 Nov, 2025 | 16:57
Updated-12 Jan, 2026 | 15:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GPU DDK - Multiple calls into PhysmemGEMPrimeExport can inherit write access permission for an existing read-only dma_buf import PMR

Software installed and run as a non-privileged user may conduct improper GPU system calls to gain write permissions to memory buffers exported as read-only. This is caused by improper handling of the memory protections for the buffer resource.

Action-Not Available
Vendor-Imagination Technologies Limited
Product-ddkGraphics DDK
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CVE-2024-25844
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.09% / 24.70%
||
7 Day CHG~0.00%
Published-03 Mar, 2024 | 00:00
Updated-23 May, 2025 | 15:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Common-Services "So Flexibilite" (soflexibilite) module for PrestaShop before version 4.1.26, allows remote attackers to escalate privileges and obtain sensitive information via debug file.

Action-Not Available
Vendor-common-servicesn/a
Product-so_flexibiliten/a
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
Details not found