Plataforma
java
Componente
public_exp
Corrigido em
5.0.1
5.1.1
5.2.1
5.3.1
CVE-2026-3268 is a vulnerability affecting PSI Probe versions 5.0 through 5.3.0. It stems from an improper access control flaw within the Session Attribute Handler component, specifically in the RemoveSessAttributeController.java file. Successful exploitation allows an attacker to gain unauthorized access to sensitive data and potentially compromise the system. A patch is expected, though the vendor has not yet responded to early disclosure attempts.
The improper access controls exposed by CVE-2026-3268 allow a remote attacker to manipulate the system and bypass intended security restrictions. This could lead to unauthorized access to session attributes, potentially exposing sensitive information such as user credentials, application data, or configuration details. An attacker could leverage this vulnerability to escalate privileges and gain broader control over the PSI Probe instance and potentially the underlying infrastructure. The public availability of an exploit significantly increases the risk of exploitation, as malicious actors can readily deploy it against vulnerable systems. The blast radius extends to any system relying on PSI Probe for monitoring and diagnostics, as compromised data could be used for further attacks.
CVE-2026-3268 is currently considered a high-risk vulnerability due to the public availability of an exploit. The exploit's public nature indicates a medium to high probability of exploitation, as attackers can readily leverage it. The vulnerability was published on 2026-02-26. While no specific campaigns have been publicly linked to this CVE, the ease of exploitation suggests it may become a target for opportunistic attackers. The lack of response from the vendor further exacerbates the risk, as timely patching is uncertain.
Status do Exploit
EPSS
0.03% (percentil 10%)
CISA SSVC
Vetor CVSS
Given the vendor's lack of response, immediate mitigation steps are crucial. First, isolate affected PSI Probe instances from external networks to limit potential exposure. Implement strict network segmentation to restrict access to only authorized users and systems. Consider using a Web Application Firewall (WAF) to filter malicious requests targeting the vulnerable endpoint. While a patch is pending, review and harden existing access control policies within PSI Probe to minimize the potential impact of exploitation. Monitor PSI Probe logs for suspicious activity and implement intrusion detection systems (IDS) to identify and respond to potential attacks. After a patch is released, upgrade to the fixed version promptly and verify the fix by attempting to reproduce the vulnerability using the publicly available exploit.
Actualice PSI Probe a una versión posterior a 5.3.0. Si no es posible actualizar, revise y restrinja el acceso al controlador RemoveSessAttributeController.java para evitar la manipulación no autorizada de los atributos de sesión.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
It's a vulnerability in PSI Probe versions 5.0-5.3.0 allowing remote attackers to bypass access controls and potentially access sensitive data.
If you are running PSI Probe versions 5.0 through 5.3.0, you are potentially affected by this vulnerability. Immediate action is recommended.
The vendor is expected to release a patch. Until then, implement mitigation strategies like network segmentation and WAF rules. Upgrade as soon as a patch is available.
The exploit is publicly available, indicating a high probability of exploitation. Monitor your systems closely for suspicious activity.
Refer to the official NVD entry for CVE-2026-3268 for detailed information and updates: https://nvd.nist.gov/vuln/detail/CVE-2026-3268
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.
Envie seu arquivo pom.xml e descubra na hora se você está afetado.