CVE-2026-8077
Deferred Deferred - Pending Action
Authorization Bypass in CashDro 3 Web Panel

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)

Description
Lack of proper authorization implementation in the CashDro 3 web administration panel, version 24.01.00.26. The backend lacks authorization controls, leaving security entirely to the frontend. By modifying the binary string in the β€˜Permissions’ field of the JSON response, an attacker could escalate privileges and gain full administrative access. This vulnerability allows all restrictions to be bypassed and completely compromises system management.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
cashdro cashdro_3 24.01.00.26
cashdro cashdro_3 26.01.00.16
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the CashDro 3 web administration panel, version 24.01.00.26, due to a lack of proper authorization controls on the backend. Instead of enforcing security server-side, the system relies solely on frontend controls. An attacker can manipulate the 'Permissions' field in the JSON response by modifying a binary string, which allows them to escalate their privileges and gain full administrative access.

As a result, all restrictions can be bypassed, completely compromising the system's management capabilities.


How can this vulnerability impact me? :

Exploiting this vulnerability allows an attacker to gain full administrative access to the CashDro 3 system without proper authorization.

  • Bypass all security restrictions and controls.
  • Manipulate system management functions, potentially leading to unauthorized cash withdrawals or configuration changes.
  • Compromise the integrity and security of cash-handling operations.

Additionally, the lack of network access control and weak authentication mechanisms (such as weak or default PINs without brute-force protection) increase the risk of unauthorized access.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by identifying the presence of the CashDro 3 device on your network and testing for weak authentication and authorization controls.

First, scan your network for exposed ports that the CashDro device might be using, especially those accessible without Network Access Control (NAC).

  • Use network scanning tools like nmap to detect open ports and identify the CashDro device: nmap -p- --open -sV <target-ip-range>
  • Attempt to authenticate using default or weak numeric PINs such as '1234' to check for weak authentication.
  • Inspect API responses from the web administration panel for the 'Permissions' field in JSON responses. Modify the binary string in this field to test if privilege escalation is possible due to lack of server-side authorization.

These steps help confirm if the backend lacks proper authorization controls, allowing privilege escalation by manipulating permission data.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting network access to the CashDro 3 device and improving authentication mechanisms.

  • Implement network segmentation and Network Access Control (NAC) to prevent unauthorized access to the CashDro device.
  • Change default or weak numeric PINs to strong, unique credentials if possible.
  • Disable or restrict access to the web administration panel from untrusted networks.

Ultimately, update the CashDro 3 device to the fixed version 26.01.00.16, which addresses weak PIN authentication and improves security controls.

Ensure physical security of the device to prevent direct network access and tampering.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in the CashDro 3 web administration panel allows attackers to bypass all authorization controls and gain full administrative access by manipulating permissions in the backend. This complete compromise of system management could lead to unauthorized access to sensitive data and system functions.

Such unauthorized access and privilege escalation can result in violations of common security requirements found in standards and regulations like GDPR and HIPAA, which mandate strict access controls and protection of sensitive data.

Failure to implement proper authorization controls and the resulting potential data breaches or unauthorized system changes could lead to non-compliance with these regulations, exposing organizations to legal and financial penalties.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart