{"api_version":"1","generated_at":"2026-04-22T21:27:34+00:00","cve":"CVE-2026-5756","urls":{"html":"https://cve.report/CVE-2026-5756","api":"https://cve.report/api/cve/CVE-2026-5756.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-5756","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-5756"},"summary":{"title":"Unauthenticated Configuration File Modification Vulnerability in DRC Central Office Services (COS)","description":"Unauthenticated Configuration File Modification Vulnerability in DRC Central Office Services (COS) allows an attacker to modify the server's configuration file, potentially leading to mass data exfiltration, malicious traffic interception, or disruption of testing services.","state":"PUBLISHED","assigner":"certcc","published_at":"2026-04-14 18:17:39","updated_at":"2026-04-17 15:17:00"},"problem_types":["CWE-306 Missing Authentication for Critical Function","CWE-94 Improper Control of Generation of Code ('Code Injection')","CWE-522 Insufficiently Protected Credentials"],"metrics":[{"version":"3.1","source":"ADP","type":"DECLARED","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"}}],"references":[{"url":"https://www.datarecognitioncorp.com/","name":"https://www.datarecognitioncorp.com/","refsource":"cret@cert.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-5756","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5756","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Data Recognition Corporation","product":"Central Office Services - Content Hosting Component","version":"affected 975","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"5756","cve":"CVE-2026-5756","epss":"0.000390000","percentile":"0.116830000","score_date":"2026-04-21","updated_at":"2026-04-22 00:07:41"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"}},{"other":{"content":{"id":"CVE-2026-5756","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-16T11:55:49.509703Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-16T12:05:46.105Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"Central Office Services - Content Hosting Component","vendor":"Data Recognition Corporation","versions":[{"status":"affected","version":"975"}]}],"descriptions":[{"lang":"en","value":"Unauthenticated Configuration File Modification Vulnerability in DRC Central Office Services (COS) allows an attacker to modify the server's configuration file, potentially leading to mass data exfiltration, malicious traffic interception, or disruption of testing services."}],"problemTypes":[{"descriptions":[{"description":"CWE-306 Missing Authentication for Critical Function","lang":"en"}]},{"descriptions":[{"description":"CWE-94 Improper Control of Generation of Code ('Code Injection')","lang":"en"}]},{"descriptions":[{"description":"CWE-522 Insufficiently Protected Credentials","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2026-04-14T17:51:53.628Z","orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc"},"references":[{"url":"https://www.datarecognitioncorp.com/"}],"source":{"discovery":"UNKNOWN"},"title":"Unauthenticated Configuration File Modification Vulnerability in DRC Central Office Services (COS)","x_generator":{"engine":"VINCE 3.0.35","env":"prod","origin":"https://cveawg.mitre.org/api/cve/CVE-2026-5756"}}},"cveMetadata":{"assignerOrgId":"37e5125f-f79b-445b-8fad-9564f167944b","assignerShortName":"certcc","cveId":"CVE-2026-5756","datePublished":"2026-04-14T17:51:53.628Z","dateReserved":"2026-04-07T16:42:45.597Z","dateUpdated":"2026-04-16T12:05:46.105Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-14 18:17:39","lastModifiedDate":"2026-04-17 15:17:00","problem_types":["CWE-306 Missing Authentication for Critical Function","CWE-94 Improper Control of Generation of Code ('Code Injection')","CWE-522 Insufficiently Protected Credentials"],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"5756","Ordinal":"1","Title":"Unauthenticated Configuration File Modification Vulnerability in","CVE":"CVE-2026-5756","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"5756","Ordinal":"1","NoteData":"Unauthenticated Configuration File Modification Vulnerability in DRC Central Office Services (COS) allows an attacker to modify the server's configuration file, potentially leading to mass data exfiltration, malicious traffic interception, or disruption of testing services.","Type":"Description","Title":"Unauthenticated Configuration File Modification Vulnerability in"}]}}}