SenseLive X3050 EUVD-2026-25360

| CVE-2026-39462 CRITICAL
Insufficiently Protected Credentials (CWE-522)
2026-04-23 icscert GHSA-fvx4-mqf9-ccvh
9.3
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

3
Analysis Generated
Apr 24, 2026 - 00:47 vuln.today
Severity Changed
Apr 24, 2026 - 00:22 NVD
HIGH CRITICAL
CVSS changed
Apr 24, 2026 - 00:22 NVD
8.1 (HIGH) 9.3 (CRITICAL)

DescriptionNVD

A vulnerability exists in SenseLive X3050’s web management interface in which password updates are not reliably applied due to improper handling of credential changes on the backend. After the device undergoes a factory restore using the SenseLive Config 2.0 tool, the interface may indicate that the password update was successful; however, the system may continue to accept the previous or default credentials, demonstrating that the password-change process is not consistently enforced. Even after a factory reset, attempted password changes may fail to propagate correctly.

AnalysisAI

Authentication bypass in SenseLive X3050 web management interface allows remote unauthenticated attackers to gain administrative access using default or previously-set credentials. After factory restore via SenseLive Config 2.0 tool, password updates fail to propagate correctly - the interface falsely reports success while the backend continues accepting old credentials. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Inventory all SenseLive X3050 devices and identify those exposed to untrusted networks; isolate any remotely accessible instances to restricted VPNs or air-gapped networks pending remediation. Within 7 days: Contact SenseLive support to determine if interim workarounds exist (such as manual backend credential resets or configuration file edits); document all devices that underwent recent factory restores via SenseLive Config 2.0. …

Sign in for detailed remediation steps.

Share

EUVD-2026-25360 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy