CVE Vulnerabilities

CVE-2026-26335

Use of Hard-coded Cryptographic Key

Published: Feb 13, 2026 | Modified: Feb 26, 2026
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Calero VeraSMART versions prior to 2022 R1 use static ASP.NET/IIS machineKey values configured for the VeraSMART web application and stored in C:Program Files (x86)VeramarkVeraSMARTWebRootweb.config. An attacker who obtains these keys can craft a valid ASP.NET ViewState payload that passes integrity validation and is accepted by the application, resulting in server-side deserialization and remote code execution in the context of the IIS application.

Weakness

The product uses a hard-coded, unchangeable cryptographic key.

Affected Software

NameVendorStart VersionEnd Version
VerasmartCalero*2022.0 (excluding)
VerasmartCalero2022.0 (including)2022.0 (including)

Potential Mitigations

References