Borg SPM 2007 CVE-2026-6886

| EUVD-2026-25211 CRITICAL
Weak Authentication (CWE-1390)
2026-04-23 twcert GHSA-qxgc-wc3f-24c9
9.3
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

2
Analysis Generated
Apr 23, 2026 - 10:30 vuln.today
CVSS changed
Apr 23, 2026 - 10:22 NVD
9.8 (CRITICAL) 9.3 (CRITICAL)

DescriptionNVD

Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has a Authentication Bypass vulnerability, allowing unauthenticated remote attackers to log into the system as any user.

AnalysisAI

Authentication bypass in Borg SPM 2007 allows remote unauthenticated attackers to impersonate any user and gain complete system access without credentials. This discontinued product (sales ended 2008) presents maximum network exposure (CVSS:4.0 9.3, AV:N/AC:L/PR:N) with trivial exploitation conditions. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Conduct inventory scan to identify any Borg SPM 2007 instances on the network and document business justification for continued operation. Within 7 days: Isolate identified systems from production networks via network segmentation or air-gapping if decommissioning is not immediately feasible. …

Sign in for detailed remediation steps.

Share

CVE-2026-6886 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy