CVE-2026-1612

AL-KO Robolinho Update Software has hard-coded AWS Access and Secret keys that allow anyone to access AL-KO's AWS bucket. Using the keys directly might give the attacker greater access than the app itself. Key grants AT LEAST read access to some of the objects in bucket. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 8.0.21.0610 and 8.0.22.0524 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.
CVSS

No CVSS.

Configurations

No configuration.

History

13 Apr 2026, 08:16

Type Values Removed Values Added
Summary
  • (es) El Software de actualización AL-KO Robolinho tiene claves de acceso y secretas de AWS codificadas de forma rígida que permiten a cualquiera acceder al bucket de AWS de AL-KO. Usar las claves directamente podría dar al atacante mayor acceso que la propia aplicación. La clave otorga AL MENOS acceso de lectura a algunos de los objetos en el bucket. El proveedor fue notificado con antelación sobre esta vulnerabilidad, pero no respondió con los detalles de la vulnerabilidad o el rango de versiones vulnerables. Solo la versión 8.0.21.0610 fue probada y confirmada como vulnerable, otras versiones no fueron probadas y también podrían ser vulnerables.
Summary (en) AL-KO Robolinho Update Software has hard-coded AWS Access and Secret keys that allow anyone to access AL-KO's AWS bucket. Using the keys directly might give the attacker greater access than the app itself. Key grants AT LEAST read access to some of the objects in bucket. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 8.0.21.0610 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable. (en) AL-KO Robolinho Update Software has hard-coded AWS Access and Secret keys that allow anyone to access AL-KO's AWS bucket. Using the keys directly might give the attacker greater access than the app itself. Key grants AT LEAST read access to some of the objects in bucket. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 8.0.21.0610 and 8.0.22.0524 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

30 Mar 2026, 11:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-30 11:16

Updated : 2026-04-13 08:16


NVD link : CVE-2026-1612

Mitre link : CVE-2026-1612

CVE.ORG link : CVE-2026-1612


JSON object : View

Products Affected

No product.

CWE
CWE-798

Use of Hard-coded Credentials