Project Subscriptions
No advisories yet.
Solution
SenseLive did not respond to CISA's requests to coordinate. Affected users are encouraged to reach out to SenseLive for more information. https://senselive.io/contact
Workaround
No workaround given by the vendor.
Tue, 28 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Senselive x3500
Senselive x3500 Firmware |
|
| CPEs | cpe:2.3:h:senselive:x3500:-:*:*:*:*:*:*:* cpe:2.3:o:senselive:x3500_firmware:1.523:*:*:*:*:*:*:* |
|
| Vendors & Products |
Senselive x3500
Senselive x3500 Firmware |
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Senselive
Senselive x3050 |
|
| Vendors & Products |
Senselive
Senselive x3050 |
Fri, 24 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in SenseLive X3050’s embedded management service allows full administrative control to be established without any form of authentication or authorization on the SenseLive config application. The service accepts management connections from any reachable host, enabling unrestricted modification of critical configuration parameters, operational modes, and device state through a vendor-supplied or compatible client. | |
| Title | SenseLive X3050 Missing authentication for critical function | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-04-24T13:09:37.232Z
Reserved: 2026-04-14T15:57:14.990Z
Link: CVE-2026-40620
Updated: 2026-04-24T13:09:33.665Z
Status : Analyzed
Published: 2026-04-24T00:16:28.690
Modified: 2026-04-28T19:32:56.537
Link: CVE-2026-40620
No data.
OpenCVE Enrichment
Updated: 2026-04-29T00:00:13Z