CVE-2026-4312

DrangSoft · GCB/FCB Audit Software

A missing authentication vulnerability in DrangSoft GCB/FCB Audit Software allows unauthenticated remote attackers to create unauthorized administrative accounts via exposed APIs.

Executive summary

DrangSoft GCB/FCB Audit Software is susceptible to a critical authentication bypass that allows unauthenticated attackers to grant themselves full administrative access.

Vulnerability

The software fails to enforce authentication on specific API endpoints used for account management. This allows an unauthenticated remote attacker to directly call these APIs and create a new account with administrative privileges.

Business impact

The impact of this vulnerability is Critical (CVSS 9.8). An attacker with administrative access can modify audit records, delete sensitive data, and manipulate financial or compliance reports. This completely undermines the integrity of the audit software and could lead to severe legal and regulatory consequences.

Remediation

Immediate Action: Update the DrangSoft GCB/FCB Audit Software to the latest version to enforce proper authentication checks on all API endpoints.

Proactive Monitoring: Review the administrative user list for any unrecognized accounts and audit the system logs for API calls originating from unexpected IP addresses.

Compensating Controls: Place the audit software behind a VPN or a Zero Trust Network Access (ZTNA) solution to restrict API access to authorized personnel only.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Apply the vendor's patch immediately. Administrative account creation is the "keys to the kingdom," and leaving this vulnerability unpatched is an unacceptable risk to organizational data integrity and compliance posture.