VYPR
Critical severityNVD Advisory· Published May 8, 2026· Updated May 8, 2026

CVE-2026-8076

CVE-2026-8076

Description

Weak credentials in the CashDro 3 web administration panel, version 24.01.00.26, where the platform allows the use of numeric PINs for user authentication. The system supports the use of PIN-based credentials, maintaining compatibility with POS software integrations deployed since 2012. This could allow an attacker to easily perform a brute-force attack against a user and gain access by trying different PINs without the account being locked. Successful exploitation of this vulnerability could result in unauthorized access to confidential configuration settings, compromising the security of the system.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CashDro 3 admin panel uses numeric PINs without account lockout, enabling brute-force attacks that can lead to full system compromise.

Vulnerability

Overview

The CashDro 3 web administration panel (version 24.01.00.26) suffers from a critical weakness in its authentication mechanism. The platform allows the use of numeric PINs for user credentials, a design choice made to maintain compatibility with POS software integrations dating back to 2012 [1][2]. This reliance on short, numeric-only passwords significantly reduces the credential space, making brute-force attacks highly feasible.

Exploitation

Vector

An attacker can exploit this vulnerability by performing a brute-force attack against a user's PIN without any account lockout mechanism [1][2]. The system does not lock the account after repeated failed login attempts, allowing an attacker to try all possible PIN combinations until the correct one is found. No authentication is required to initiate the attack, and it can be carried out over the network [2]. /a].

Impact

Successful exploitation grants an attacker unauthorized access to the web administration panel. With this access, an attacker can view and modify confidential configuration settings, potentially compromising the entire system [1][2]. The advisory notes that this could lead to unauthorized cash extraction from the physical smart drawer [1].

Mitigation

As of the publication date (2026-05-08), INCIBE has coordinated disclosure of this vulnerability [2]. Users are advised to apply any available patches from CashDro and to implement network segmentation and strong password policies where possible. The vendor has not yet released a public patch at the time of this writing.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.