CVE-2026-1324

Source
https://cve.org/CVERecord?id=CVE-2026-1324
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1324.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-1324
Published
2026-01-22T15:16:50.420Z
Modified
2026-03-14T15:05:33.323652Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was identified in Sangfor Operation and Maintenance Management System up to 3.0.12. Affected by this issue is the function SessionController of the file /isomp-protocol/protocol/session of the component SSH Protocol Handler. The manipulation of the argument keypassword leads to os command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "3.0.12"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1324.json"