Impact
A flaw in the session management of the SenseLive X3050 web interface allows authenticated sessions to remain active for longer than intended, meaning that an attacker who has already logged in can continue to use the interface without re‑authentication. This leads to the possibility of performing additional administrative actions, modifying configuration settings, or viewing sensitive information for an extended period.
Affected Systems
The vulnerability affects the SenseLive X3050 model, specifically its web management interface. No specific firmware or software versions are listed, so all installations of the X3050 are assumed to be susceptible.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity. The EPSS score of less than 1% suggests that the probability of exploitation is low. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an existing authenticated session, so the attack vector is likely internal or through a compromised account. Overall risk is moderate but the likelihood of an attacker gaining sustained privileged access is considered low with current public knowledge.
OpenCVE Enrichment