Project Subscriptions
No advisories yet.
Solution
Pelco, Inc. recommends that all Sarix Professional 3 Series Camera users update their camera firmware to version 02.53 or later. Installing the latest firmware ensures your device receives the most up-to-date bug fixes and critical security enhancements. More information can be found by visiting Pelco, Inc's technical support page ( https://www.pelco.com/support ) for assistance.
Workaround
No workaround given by the vendor.
Fri, 27 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pelco
Pelco sarix Professional Ibp 3 Series Pelco sarix Professional Imp 3 Series Pelco sarix Professional Iwp 3 Series Pelco sarix Professional Ixp 3 Series |
|
| Vendors & Products |
Pelco
Pelco sarix Professional Ibp 3 Series Pelco sarix Professional Imp 3 Series Pelco sarix Professional Iwp 3 Series Pelco sarix Professional Ixp 3 Series |
Thu, 26 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Pelco, Inc. Sarix Professional 3 Series Cameras are vulnerable to an authentication bypass issue in their web management interface. The flaw stems from inadequate enforcement of access controls, allowing certain functionality to be accessed without proper authentication. This weakness can lead to unauthorized viewing of live video streams, creating privacy concerns and operational risks for organizations relying on these cameras. Additionally, it may expose operators to regulatory and compliance challenges. | |
| Title | Authentication Bypass Using an Alternate Path or Channel in Pelco, Inc. Sarix Pro 3 Series IP Cameras | |
| Weaknesses | CWE-288 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-02-26T20:43:53.216Z
Reserved: 2026-01-20T18:26:34.854Z
Link: CVE-2026-1241
Updated: 2026-02-26T20:43:17.816Z
Status : Awaiting Analysis
Published: 2026-02-26T20:31:33.657
Modified: 2026-02-27T14:06:37.987
Link: CVE-2026-1241
No data.
OpenCVE Enrichment
Updated: 2026-02-27T09:07:08Z