LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-2699 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: April 3, 2026

Customer Managed ShareFile Storage Zones Controller - Authentication Bypass

Published: April 2, 2026Updated: April 3, 2026PoC AvailableRemote Exploitable

Overview

Customer Managed ShareFile Storage Zones Controller contains an authentication bypass caused by unauthenticated access to restricted configuration pages, letting unauthenticated attackers change system configuration and potentially execute remote code.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 41.0%(Probability of exploitation in next 30 days)

Impact

Unauthenticated attackers can change system configuration and potentially execute remote code, leading to full system compromise.

Mitigation

Update to the latest version of Customer Managed ShareFile Storage Zones Controller.

Social Media Activity(2 posts)

TheHackerWire
TheHackerWire
@thehackerwire
Apr 5, 2026

šŸ”“ CVE-2026-2699 - Critical (9.8) Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution. šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-2699/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post
BeyondMachines :verified:
BeyondMachines :verified:
@beyondmachines1
Apr 4, 2026

Progress Software Patches Critical RCE Chain in ShareFile Storage Zones Controller Progress Software patched two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) in ShareFile Storage Zones Controller that allow unauthenticated attackers to bypass authentication and execute remote code. **If you manage your own ShareFile storage zones, update to version 5.12.4 or move to version 6 to prevent full system takeover. File transfer tools are high-value targets for ransomware groups, so treat this patch as a top priority. If you can't patch, isolate the instances until they are patched. General isolation doesn't work since these systems are designed to be accessible from the public internet.** #cybersecurity #infosec #advisory #vulnerability https://beyondmachines.net/event_details/progress-software-patches-critical-rce-chain-in-sharefile-storage-zones-controller-6-f-a-f-n/gD2P6Ple2L

View original post

Details

CVE ID
CVE-2026-2699
Severity
Critical
CVSS Score
9.8
Type
broken_access_control
Status
unconfirmed
EPSS
41.0%
Nuclei
Available
Social Posts
2

CWE

  • CWE-284

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

41.0%Probability of exploitation in the next 30 days

Nuclei Template

View Nuclei Template