A vulnerability in 
SenseLive

X3050’s web management interface allows unauthorized access to certain configuration endpoints due to improper access control enforcement. An attacker with network access to the device may be able to bypass the intended authentication mechanism and directly interact with sensitive configuration functions.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

SenseLive did not respond to CISA's requests to coordinate. Affected users are encouraged to reach out to SenseLive for more information. https://senselive.io/contact


Workaround

No workaround given by the vendor.

History

Fri, 24 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in  SenseLive X3050’s web management interface allows unauthorized access to certain configuration endpoints due to improper access control enforcement. An attacker with network access to the device may be able to bypass the intended authentication mechanism and directly interact with sensitive configuration functions.
Title SenseLive X3050 Authentication bypass using an alternate path or channel
Weaknesses CWE-288
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-04-24T13:11:46.041Z

Reserved: 2026-04-14T16:05:54.127Z

Link: CVE-2026-40630

cve-icon Vulnrichment

Updated: 2026-04-24T13:11:42.873Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-24T00:16:29.040

Modified: 2026-04-24T14:40:12.517

Link: CVE-2026-40630

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses