CVE-2026-1618

8.8 HIGH

📋 TL;DR

This authentication bypass vulnerability in Universal Software Inc.'s FlexCity/Kiosk software allows attackers to gain unauthorized access and escalate privileges by using alternate paths or channels. It affects all FlexCity/Kiosk installations running versions 1.0 through 1.0.35. Organizations using this software for public-facing kiosks or internal systems are at risk.

💻 Affected Systems

Products:
  • Universal Software Inc. FlexCity/Kiosk
Versions: from 1.0 before 1.0.36
Operating Systems: Unknown - likely Windows-based given kiosk software
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within affected version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over kiosk systems, potentially accessing sensitive data, installing malware, or using compromised systems as footholds into internal networks.

🟠

Likely Case

Unauthorized users bypass authentication to access restricted functionality, modify system settings, or access user data stored on kiosk devices.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to isolated kiosk systems without lateral movement to critical infrastructure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically require minimal technical skill to exploit once the method is discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.36

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-26-0065

Restart Required: Yes

Instructions:

1. Download FlexCity/Kiosk version 1.0.36 from vendor portal
2. Backup current configuration and data
3. Run installer to upgrade existing installation
4. Restart the kiosk system
5. Verify authentication mechanisms are functioning correctly

🔧 Temporary Workarounds

Network Isolation

all

Place kiosk systems on isolated network segments to limit potential lateral movement

Enhanced Monitoring

all

Implement strict monitoring of authentication logs and failed access attempts

🧯 If You Can't Patch

  • Disconnect vulnerable kiosks from network or place behind strict firewall rules
  • Implement physical security controls to prevent unauthorized physical access to kiosk devices

🔍 How to Verify

Check if Vulnerable:

Check software version in application settings or About dialog. If version is between 1.0 and 1.0.35 inclusive, system is vulnerable.

Check Version:

Check application GUI or consult vendor documentation for version verification method

Verify Fix Applied:

Verify version is 1.0.36 or higher and test authentication mechanisms to ensure they cannot be bypassed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Multiple failed login attempts followed by successful access from same source
  • Access to administrative functions from non-admin accounts

Network Indicators:

  • Unexpected network connections from kiosk systems
  • Traffic to unusual ports or destinations

SIEM Query:

source="kiosk_logs" AND (event_type="auth_bypass" OR (failed_auth=3 AND success_auth=1 within 5min))

🔗 References

📤 Share & Export