CVE-2026-1618
📋 TL;DR
This authentication bypass vulnerability in Universal Software Inc.'s FlexCity/Kiosk software allows attackers to gain unauthorized access and escalate privileges by using alternate paths or channels. It affects all FlexCity/Kiosk installations running versions 1.0 through 1.0.35. Organizations using this software for public-facing kiosks or internal systems are at risk.
💻 Affected Systems
- Universal Software Inc. FlexCity/Kiosk
📦 What is this software?
Flexcity by Uni Yaz
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full administrative control over kiosk systems, potentially accessing sensitive data, installing malware, or using compromised systems as footholds into internal networks.
Likely Case
Unauthorized users bypass authentication to access restricted functionality, modify system settings, or access user data stored on kiosk devices.
If Mitigated
With proper network segmentation and monitoring, impact is limited to isolated kiosk systems without lateral movement to critical infrastructure.
🎯 Exploit Status
Authentication bypass vulnerabilities typically require minimal technical skill to exploit once the method is discovered.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.0.36
Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-26-0065
Restart Required: Yes
Instructions:
1. Download FlexCity/Kiosk version 1.0.36 from vendor portal
2. Backup current configuration and data
3. Run installer to upgrade existing installation
4. Restart the kiosk system
5. Verify authentication mechanisms are functioning correctly
🔧 Temporary Workarounds
Network Isolation
allPlace kiosk systems on isolated network segments to limit potential lateral movement
Enhanced Monitoring
allImplement strict monitoring of authentication logs and failed access attempts
🧯 If You Can't Patch
- Disconnect vulnerable kiosks from network or place behind strict firewall rules
- Implement physical security controls to prevent unauthorized physical access to kiosk devices
🔍 How to Verify
Check if Vulnerable:
Check software version in application settings or About dialog. If version is between 1.0 and 1.0.35 inclusive, system is vulnerable.
Check Version:
Check application GUI or consult vendor documentation for version verification method
Verify Fix Applied:
Verify version is 1.0.36 or higher and test authentication mechanisms to ensure they cannot be bypassed.
📡 Detection & Monitoring
Log Indicators:
- Unusual authentication patterns
- Multiple failed login attempts followed by successful access from same source
- Access to administrative functions from non-admin accounts
Network Indicators:
- Unexpected network connections from kiosk systems
- Traffic to unusual ports or destinations
SIEM Query:
source="kiosk_logs" AND (event_type="auth_bypass" OR (failed_auth=3 AND success_auth=1 within 5min))