{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2103","assignerOrgId":"27b6da8a-f51d-48d9-9eef-9b7f3405d20d","state":"PUBLISHED","assignerShortName":"BLSOPS","dateReserved":"2026-02-06T13:40:47.744Z","datePublished":"2026-02-06T16:22:28.282Z","dateUpdated":"2026-02-06T16:39:17.314Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Windows"],"product":"SyteLine ERP","vendor":"Infor","versions":[{"status":"affected","version":"10.0.8803.16889"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Infor SyteLine ERP uses hard-coded static cryptographic keys to encrypt stored credentials, including user passwords, database connection strings, and API keys. The encryption keys are identical across all installations. An attacker with access to the application binary and database can decrypt all stored credentials."}],"value":"Infor SyteLine ERP uses hard-coded static cryptographic keys to encrypt stored credentials, including user passwords, database connection strings, and API keys. The encryption keys are identical across all installations. An attacker with access to the application binary and database can decrypt all stored credentials."}],"impacts":[{"capecId":"CAPEC-191","descriptions":[{"lang":"en","value":"CAPEC-191 Read Sensitive Strings Within an Executable"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-321","description":"CWE-321","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"27b6da8a-f51d-48d9-9eef-9b7f3405d20d","shortName":"BLSOPS","dateUpdated":"2026-02-06T16:22:28.282Z"},"references":[{"url":"https://blog.blacklanternsecurity.com/p/cve-2026-2103-infor-syteline-erp"}],"source":{"discovery":"INTERNAL"},"title":"Use of Hard-Coded Cryptographic Key for Password Storage","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-06T16:38:53.194813Z","id":"CVE-2026-2103","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-06T16:39:17.314Z"}}]}}