EventSentry versions prior to 6.0.1.20 contain an unverified password change vulnerability in the account management functionality of the Web Reports interface. The password change mechanism does not require validation of the current password before allowing a new password to be set. An attacker who gains temporary access to an authenticated user session can change the account password without knowledge of the original credentials. This enables persistent account takeover and, if administrative accounts are affected, may result in privilege escalation.
History

Tue, 24 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
Description EventSentry versions prior to 6.0.1.20 contain an unverified password change vulnerability in the account management functionality of the Web Reports interface. The password change mechanism does not require validation of the current password before allowing a new password to be set. An attacker who gains temporary access to an authenticated user session can change the account password without knowledge of the original credentials. This enables persistent account takeover and, if administrative accounts are affected, may result in privilege escalation.
Title EventSentry < 6.0.1.20 Web Reports Unverified Password Change
Weaknesses CWE-620
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-24T21:40:48.632Z

Reserved: 2026-01-22T20:23:19.804Z

Link: CVE-2026-24443

cve-icon Vulnrichment

Updated: 2026-02-24T21:40:44.239Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-24T21:16:29.293

Modified: 2026-02-24T21:52:01.367

Link: CVE-2026-24443

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.