CVE-2026-44873
🔶 mediumSummary
A session management vulnerability in AOS-8 allows previously authenticated users to retain network access after their accounts are administratively disabled. Existing sessions are not invalidated when credentials are revoked, enabling continued access until session expiration. An attacker with compromised credentials could exploit this behavior to maintain unauthorized access even after the account has been disabled.
CVSS Score
5.4
Medium
EPSS Score
0.0
Exploit Probability
Published Date
2026-05-12
First Seen: 2026-05-17
📊 Relative Risk Intelligence
This CVE is Lower Risk - more severe than 22.9% of all 321,566 vulnerabilities in our database.
#247,909
Below average severity
Severity Percentile
🎯 CISA SSVC Assessment Updated: May 12, 2026
🔍 Exploitation Status
None
No known exploits
⚙️ Automatable
NO
Requires human interaction
💥 Technical Impact
Partial
Limited system impact
🏆 Discovered By
0x50d (reporter)
SSVC data provided by
CISA
Last Modified
2026-05-15
Source
NVD 🔗
CVSS Vector 3.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CWE IDs (Weakness Types)