CVE-2026-26722: Global Facilities Management Software Weak Authentication Mechanism Summary PIN authentication supported for admin access. Vendor Key Systems Inc. Product Global Facilities Management Software Affected Asset Login functionality - PIN Vulnerable Version 20230721a Version Fixed N/A Researcher Chandler Johnson NIST CVE Link https://nvd.nist.gov/vuln/detail/CVE-2026-26722 Description Admin account takeover is possible on Key Systems Inc. Global Facility Management Software version 20230721a due to weaknesses in the authentication mechanism. The application supports PIN-based authentication and does not enforce account lockout, rate limiting, or multi-factor authentication, allowing attackers to brute force the numeric PIN and gain unauthorized administrative access. CVSS Vulnerability Scoring Calculator (3.1) AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H CVSS Base Score: 9.4 (Critical) Impact Admin account takeover. Steps to Reproduce 1. Validate GFMS version by navigating to the Panel. 2. Navigate to the GFMS login page. 3. Attempt to authenticate with an arbitrary UserID and PIN and observe the error message that states, "User not found in user list". 4. Try another UserID that is valid such as and observe the new error message that states, "Incorrect user PIN entered". 5. Brute force the 's PIN using a web proxy tool such as Burp Suite Intruder. 6. Filter the HTTP responses for [Status: OK]. The payload used in this request is the 's PIN. 7. Authenticate with the valid UserID and PIN. Additional Information Attackers exploit weak authentication mechanisms by leveraging weaknesses to gain unauthorized access into applications. When applications lack robust authentication mechanisms, the stored data and available functions are at significant risk. Recommendations Do not allow PIN authentication and instead require strong complex passwords. Implement rate limiting and lockout mechanisms to prevent brute forcing credentials. Configure Multi-Factor Authentication (MFA) for another layer of validation prior to account access. Mitigate risk by remediating credential enumeration vulnerabilities.