CVE-2026-2624

9.8 CRITICAL

📋 TL;DR

This critical vulnerability allows attackers to bypass authentication mechanisms in ePati Antikor Next Generation Firewall (NGFW), potentially gaining unauthorized administrative access. It affects all systems running vulnerable versions of the firewall software. Organizations using affected versions are at immediate risk of compromise.

💻 Affected Systems

Products:
  • ePati Cyber Security Technologies Inc. Antikor Next Generation Firewall (NGFW)
Versions: v.2.0.1298 through v.2.0.1300
Operating Systems: Firewall-specific OS
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete firewall compromise allowing attackers to reconfigure security policies, intercept network traffic, disable security controls, and pivot to internal networks.

🟠

Likely Case

Unauthorized administrative access leading to firewall rule manipulation, network traffic monitoring, and potential lateral movement into protected networks.

🟢

If Mitigated

Limited impact if firewall is isolated with strict network segmentation and additional authentication layers, though core functionality remains vulnerable.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities typically require minimal technical skill to exploit once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v.2.0.1301

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-26-0082

Restart Required: Yes

Instructions:

1. Download v.2.0.1301 from vendor portal. 2. Backup current configuration. 3. Apply update through admin interface. 4. Reboot firewall. 5. Verify version and functionality.

🔧 Temporary Workarounds

Network Isolation

all

Restrict management interface access to trusted IP addresses only

Configure firewall rules to allow management access only from specific administrative subnets

Multi-factor Authentication

all

Implement additional authentication layer for management access

Configure RADIUS/TACACS+ with MFA for admin authentication

🧯 If You Can't Patch

  • Immediately isolate firewall management interface from untrusted networks
  • Implement network monitoring for unusual authentication attempts or configuration changes

🔍 How to Verify

Check if Vulnerable:

Check firewall version in admin interface: System > About > Version

Check Version:

Check via admin interface or SSH: show version

Verify Fix Applied:

Confirm version shows v.2.0.1301 or later in admin interface

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful login from same IP
  • Configuration changes from unexpected IP addresses
  • Admin login from non-standard locations

Network Indicators:

  • Unusual management interface traffic patterns
  • Authentication requests bypassing normal flow

SIEM Query:

source="firewall" AND (event_type="auth_success" AND NOT src_ip IN admin_subnets) OR (config_change AND NOT user IN admin_users)

🔗 References

📤 Share & Export