SenseLive X3050 CVE-2026-40620

| EUVD-2026-25362 CRITICAL
Missing Authentication for Critical Function (CWE-306)
2026-04-24 icscert GHSA-3jcw-ch7p-f8v8
9.3
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

2
Analysis Generated
Apr 24, 2026 - 00:45 vuln.today
CVSS changed
Apr 24, 2026 - 00:22 NVD
9.8 (CRITICAL) 9.3 (CRITICAL)

DescriptionNVD

A vulnerability in SenseLive X3050’s embedded management service allows full administrative control to be established without any form of authentication or authorization on the SenseLive config application. The service accepts management connections from any reachable host, enabling unrestricted modification of critical configuration parameters, operational modes, and device state through a vendor-supplied or compatible client.

AnalysisAI

SenseLive X3050's embedded management service grants full administrative control to unauthenticated remote attackers. The CVSS 4.0 score of 9.3 with network attack vector (AV:N), low complexity (AC:L), and no required privileges (PR:N) confirms this allows complete device compromise from any network-reachable host. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify and inventory all SenseLive X3050 devices using network scanning; isolate affected devices to air-gapped or segmented networks with restricted access controls. Within 7 days: Implement network-layer access restrictions (firewall rules, VLANs) to block all inbound connections to the management service on affected devices; document baseline device configurations for integrity monitoring. …

Sign in for detailed remediation steps.

Share

CVE-2026-40620 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy