Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://devolutions.net/security/advisories/DEVO-2026-0003/ |
|
Tue, 10 Feb 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:* |
Tue, 20 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 20 Jan 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Devolutions
Devolutions devolutions Server |
|
| Vendors & Products |
Devolutions
Devolutions devolutions Server |
Mon, 19 Jan 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Incorrect Authorization vulnerability in virtual gateway component in Devolutions Server allows attackers to bypass deny IP rules.This issue affects Server: from 2025.3.1 through 2025.3.12. | |
| Weaknesses | CWE-863 | |
| References |
|
Status: PUBLISHED
Assigner: DEVOLUTIONS
Published:
Updated: 2026-01-20T15:02:33.576Z
Reserved: 2026-01-15T21:15:42.207Z
Link: CVE-2026-1007
Updated: 2026-01-20T14:59:49.665Z
Status : Analyzed
Published: 2026-01-19T15:15:50.220
Modified: 2026-02-10T16:59:28.517
Link: CVE-2026-1007
No data.
OpenCVE Enrichment
Updated: 2026-04-18T05:15:15Z