{"id":78367,"date":"2026-05-12T23:46:45","date_gmt":"2026-05-12T20:16:45","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/cve-2026-44873-insufficient-session-invalidation-on-user-account-deactivation-in-aos-8-operating-system\/"},"modified":"2026-05-12T23:46:45","modified_gmt":"2026-05-12T20:16:45","slug":"cve-2026-44873-insufficient-session-invalidation-on-user-account-deactivation-in-aos-8-operating-system","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2026-44873-insufficient-session-invalidation-on-user-account-deactivation-in-aos-8-operating-system\/","title":{"rendered":"CVE-2026-44873 &#8211; Insufficient Session Invalidation on User Account Deactivation in AOS-8 Operating System"},"content":{"rendered":"<p>CVE ID :CVE-2026-44873<\/p>\n<p>  Published : May 12, 2026, 8:16 p.m. | 42\u00a0minutes ago<\/p>\n<p>  Description :A session management vulnerability in AOS-8 allows previously authenticated users to retain network access after their accounts are administratively disabled. Existing sessions are not invalidated when credentials are revoked, enabling continued access until session expiration. An attacker with compromised credentials could exploit this behavior to maintain unauthorized access even after the account has been disabled.<\/p>\n<p>  Severity: 5.4 | MEDIUM<\/p>\n<p>  Visit the link for more details, such as CVSS details, affected products, timeline, and more&#8230;\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE ID :CVE-2026-44873 Published : May 12, 2026, 8:16 p.m. | 42\u00a0minutes ago Description :A session management vulnerability in AOS-8 allows previously authenticated users to retain network access after their accounts are administratively disabled. Existing sessions are not invalidated when credentials are revoked, enabling continued access until session expiration. An attacker with compromised credentials could &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-78367","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=78367"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78367\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=78367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=78367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=78367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}