X3050’s web management interface due to improper session lifetime enforcement, allowing authenticated sessions to remain active for extended periods without requiring re-authentication. An attacker with access to a previously authenticated session could continue interacting with administrative functions long after legitimate user activity has ceased.
Project Subscriptions
No data.
No advisories yet.
Solution
SenseLive did not respond to CISA's requests to coordinate. Affected users are encouraged to reach out to SenseLive for more information. https://senselive.io/contact
Workaround
No workaround given by the vendor.
Fri, 24 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability exists in SenseLive X3050’s web management interface due to improper session lifetime enforcement, allowing authenticated sessions to remain active for extended periods without requiring re-authentication. An attacker with access to a previously authenticated session could continue interacting with administrative functions long after legitimate user activity has ceased. | |
| Title | SenseLive X3050 Insufficient session expiration | |
| Weaknesses | CWE-613 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-04-24T13:11:12.953Z
Reserved: 2026-04-14T16:05:54.140Z
Link: CVE-2026-25720
Updated: 2026-04-24T13:11:09.221Z
Status : Awaiting Analysis
Published: 2026-04-24T00:16:26.577
Modified: 2026-04-24T14:39:56.310
Link: CVE-2026-25720
No data.
OpenCVE Enrichment
No data.