LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-3000 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: March 2, 2026

Changing IDExpert Windows Logon Agent - Remote Code Execution

Published: March 2, 2026Updated: March 2, 2026Remote Exploitable

Overview

Changing IDExpert Windows Logon Agent contains a remote code execution caused by forcing the system to download and execute arbitrary DLL files from a remote source, letting unauthenticated remote attackers execute code remotely, exploit requires no special privileges.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 10.2%(Probability of exploitation in next 30 days)

Impact

Unauthenticated remote attackers can execute arbitrary code remotely, potentially leading to full system compromise.

Mitigation

Update to the latest version.

Social Media Activity(3 posts)

Yazoul Alerts
Yazoul Alerts
@Matchbook3469
Mar 3, 2026

⛔ New security advisory: CVE-2026-3000 affects multiple systems. • Impact: Remote code execution or complete system compromise possible • Risk: Attackers can gain full control of affected systems • Mitigation: Patch immediately or isolate affected systems Full breakdown: https://yazoul.net/advisory/cve/cve-2026-3000 #Cybersecurity #SecurityPatching #HackerNews

View original post
Offensive Sequence
Offensive Sequence
@offseq
Mar 2, 2026

🚨 CVE-2026-3000 (CRITICAL): IDExpert Windows Logon Agent v2.7.3.230719 allows unauthenticated remote code execution via malicious DLL download. Disable agent, monitor for unusual activity, restrict outbound traffic. https://radar.offseq.com/threat/cve-2026-3000-cwe-494-download-of-code-without-int-6f96a540 #OffSeq #Cybersecurity #RCE #CVE

View original post
TheHackerWire
TheHackerWire
@thehackerwire
Mar 2, 2026

🔴 CVE-2026-3000 - Critical (9.8) IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary DLL files from a remote source and execute them. 🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3000/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-3000
Severity
Critical
CVSS Score
9.8
Type
remote_code_execution
Status
unconfirmed
EPSS
10.2%
Social Posts
3

CWE

  • CWE-494

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

10.2%Probability of exploitation in the next 30 days