SenseLive
X3050’s web management interface allows unauthorized access to certain configuration endpoints due to improper access control enforcement. An attacker with network access to the device may be able to bypass the intended authentication mechanism and directly interact with sensitive configuration functions.
Project Subscriptions
No data.
No advisories yet.
Solution
SenseLive did not respond to CISA's requests to coordinate. Affected users are encouraged to reach out to SenseLive for more information. https://senselive.io/contact
Workaround
No workaround given by the vendor.
Fri, 24 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in SenseLive X3050’s web management interface allows unauthorized access to certain configuration endpoints due to improper access control enforcement. An attacker with network access to the device may be able to bypass the intended authentication mechanism and directly interact with sensitive configuration functions. | |
| Title | SenseLive X3050 Authentication bypass using an alternate path or channel | |
| Weaknesses | CWE-288 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-04-23T23:45:46.695Z
Reserved: 2026-04-14T16:05:54.127Z
Link: CVE-2026-40630
No data.
Status : Received
Published: 2026-04-24T00:16:29.040
Modified: 2026-04-24T00:16:29.040
Link: CVE-2026-40630
No data.
OpenCVE Enrichment
No data.