CVE-2026-26335

Calero VeraSMART versions prior to 2022 R1 use static ASP.NET/IIS machineKey values configured for the VeraSMART web application and stored in C:\\Program Files (x86)\\Veramark\\VeraSMART\\WebRoot\\web.config. An attacker who obtains these keys can craft a valid ASP.NET ViewState payload that passes integrity validation and is accepted by the application, resulting in server-side deserialization and remote code execution in the context of the IIS application.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:calero:verasmart:*:*:*:*:*:*:*:*
cpe:2.3:a:calero:verasmart:2022.0:-:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-13 21:16

Updated : 2026-02-26 22:45


NVD link : CVE-2026-26335

Mitre link : CVE-2026-26335

CVE.ORG link : CVE-2026-26335


JSON object : View

Products Affected

calero

  • verasmart
CWE
CWE-321

Use of Hard-coded Cryptographic Key