SenseLive X3050 CVE-2026-27843

| EUVD-2026-25354 CRITICAL
Missing Authentication for Critical Function (CWE-306)
2026-04-23 icscert GHSA-7pfm-4rh7-6vp4
9.2
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

2
Analysis Generated
Apr 24, 2026 - 00:46 vuln.today
CVSS changed
Apr 24, 2026 - 00:22 NVD
9.1 (CRITICAL) 9.2 (CRITICAL)

DescriptionNVD

A vulnerability exists in SenseLive X3050's web management interface that allows critical configuration parameters to be modified without sufficient authentication or server-side validation. By applying unsupported or disruptive values to recovery mechanisms and network settings, an attacker can induce a persistent lockout state. Because the device lacks a physical reset button, recovery requires specialized technical access via the console to perform a factory reset, resulting in a total denial-of-service for the gateway and its connected RS-485 downstream systems.

AnalysisAI

Remote unauthenticated attackers can permanently disable SenseLive X3050 industrial gateways and connected RS-485 downstream systems by modifying critical configuration parameters through the web management interface. The device's lack of physical reset button forces specialized console-based factory reset procedures, making this a high-impact operational disruption vector for industrial environments. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Inventory all SenseLive X3050 gateways in production and classify by criticality; restrict network access to web management interfaces using firewall rules or air-gapping. Within 7 days: Implement network segmentation isolating affected gateways from untrusted networks; deploy continuous monitoring for configuration change attempts. …

Sign in for detailed remediation steps.

Share

CVE-2026-27843 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy