CVE-2026-26335

Calero VeraSMART versions prior to 2022 R1 use static ASP.NET/IIS machineKey values configured for the VeraSMART web application and stored in C:\\Program Files (x86)\\Veramark\\VeraSMART\\WebRoot\\web.config. An attacker who obtains these keys can craft a valid ASP.NET ViewState payload that passes integrity validation and is accepted by the application, resulting in server-side deserialization and remote code execution in the context of the IIS application.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:calero:verasmart:*:*:*:*:*:*:*:*
cpe:2.3:a:calero:verasmart:2022.0:-:*:*:*:*:*:*

History

26 Feb 2026, 22:45

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://www.calero.com/ - () https://www.calero.com/ - Product
References () https://www.vulncheck.com/advisories/calero-verasmart-2022-r1-static-iis-machine-keys-enable-viewstate-rce - () https://www.vulncheck.com/advisories/calero-verasmart-2022-r1-static-iis-machine-keys-enable-viewstate-rce - Third Party Advisory
CPE cpe:2.3:a:calero:verasmart:2022.0:-:*:*:*:*:*:*
cpe:2.3:a:calero:verasmart:*:*:*:*:*:*:*:*
First Time Calero verasmart
Calero

13 Feb 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-13 21:16

Updated : 2026-02-26 22:45


NVD link : CVE-2026-26335

Mitre link : CVE-2026-26335

CVE.ORG link : CVE-2026-26335


JSON object : View

Products Affected

calero

  • verasmart
CWE
CWE-321

Use of Hard-coded Cryptographic Key