Impact
The firmware of Tattile Smart+, Vega, and Basic device families up to version 1.181.5 exposes the Real Time Streaming Protocol (RTSP) service without any authentication. This flaw allows an attacker to connect to the RTSP endpoint and retrieve live video and audio streams, causing a direct breach of surveillance data confidentiality. The weakness is a Missing Authentication for Sensitive Function (CWE‑306).
Affected Systems
Vendors affected are Tattile s.r.l. products including ANPR Mobile, Axle Counter, Basic MK2, Smart+, Smart+ Speed, Smart+ Traffic Light, Tolling+, Vega11, Vega33, and Vega53. Firmware versions 1.181.5 and all earlier releases are vulnerable; newer firmware releases are not impacted.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.7, indicating high severity, while the EPSS score is below 1%, suggesting a low but non‑zero exploitation probability. It is not listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is a remote network attacker able to reach the device’s RTSP service; full exploitation requires only network access to the default RTSP ports, and no additional credentials are needed.
OpenCVE Enrichment