Calero VeraSMART versions prior to 2022 R1 use static ASP.NET/IIS machineKey values configured for the VeraSMART web application and stored in C:\\Program Files (x86)\\Veramark\\VeraSMART\\WebRoot\\web.config. An attacker who obtains these keys can craft a valid ASP.NET ViewState payload that passes integrity validation and is accepted by the application, resulting in server-side deserialization and remote code execution in the context of the IIS application.
References
| Link | Resource |
|---|---|
| https://www.calero.com/ | Product |
| https://www.vulncheck.com/advisories/calero-verasmart-2022-r1-static-iis-machine-keys-enable-viewstate-rce | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-13 21:16
Updated : 2026-02-26 22:45
NVD link : CVE-2026-26335
Mitre link : CVE-2026-26335
CVE.ORG link : CVE-2026-26335
JSON object : View
Products Affected
calero
- verasmart
CWE
CWE-321
Use of Hard-coded Cryptographic Key
