Exposure of Sensitive Information to an Unauthorized Actor vulnerability in EFM-Networks, Inc. IpTIME T5008, EFM-Networks, Inc. IpTIME AX2004M, EFM-Networks, Inc. IpTIME AX3000Q, EFM-Networks, Inc. IpTIME AX6000M allows Authentication Bypass.This issue affects ipTIME T5008: through 15.26.8; ipTIME AX2004M: through 15.26.8; ipTIME AX3000Q: through 15.26.8; ipTIME AX6000M: through 15.26.8.

Subscriptions

Vendors Products
Efm-networks Subscribe
Iptime Ax2004m Subscribe
Iptime Ax3000q Subscribe
Iptime Ax6000m Subscribe
Iptime T5008 Subscribe
Ax2004m Subscribe
Ax2004m Firmware Subscribe
Ax3000q Subscribe
Ax3000q Firmware Subscribe
Ax6000m Subscribe
Ax6000m Firmware Subscribe
T5008 Firmware Subscribe

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 17 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Iptime
Iptime ax2004m
Iptime ax2004m Firmware
Iptime ax3000q
Iptime ax3000q Firmware
Iptime ax6000m
Iptime ax6000m Firmware
Iptime t5008
Iptime t5008 Firmware
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:h:iptime:ax2004m:-:*:*:*:*:*:*:*
cpe:2.3:h:iptime:ax3000q:-:*:*:*:*:*:*:*
cpe:2.3:h:iptime:ax6000m:-:*:*:*:*:*:*:*
cpe:2.3:h:iptime:t5008:-:*:*:*:*:*:*:*
cpe:2.3:o:iptime:ax2004m_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:iptime:ax3000q_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:iptime:ax6000m_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:iptime:t5008_firmware:*:*:*:*:*:*:*:*
Vendors & Products Iptime
Iptime ax2004m
Iptime ax2004m Firmware
Iptime ax3000q
Iptime ax3000q Firmware
Iptime ax6000m
Iptime ax6000m Firmware
Iptime t5008
Iptime t5008 Firmware
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Efm-networks
Efm-networks iptime Ax2004m
Efm-networks iptime Ax3000q
Efm-networks iptime Ax6000m
Efm-networks iptime T5008
Vendors & Products Efm-networks
Efm-networks iptime Ax2004m
Efm-networks iptime Ax3000q
Efm-networks iptime Ax6000m
Efm-networks iptime T5008

Fri, 27 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive Information to an Unauthorized Actor vulnerability in EFM-Networks, Inc. IpTIME T5008, EFM-Networks, Inc. IpTIME AX2004M, EFM-Networks, Inc. IpTIME AX3000Q, EFM-Networks, Inc. IpTIME AX6000M allows Authentication Bypass.This issue affects ipTIME T5008: through 15.26.8; ipTIME AX2004M: through 15.26.8; ipTIME AX3000Q: through 15.26.8; ipTIME AX6000M: through 15.26.8.
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: krcert

Published:

Updated: 2026-02-27T16:03:35.360Z

Reserved: 2026-01-23T05:22:54.361Z

Link: CVE-2026-24498

cve-icon Vulnrichment

Updated: 2026-02-27T16:03:27.316Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T02:16:19.403

Modified: 2026-03-17T15:46:33.370

Link: CVE-2026-24498

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-27T09:12:27Z

Weaknesses