Description
A vulnerability was detected in Mendi Neurofeedback Headset V4. Affected by this vulnerability is an unknown functionality of the component Bluetooth Low Energy Handler. Performing a manipulation results in cleartext transmission of sensitive information. The attack can only be performed from the local network. The attack's complexity is rated as high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-07
Score: 2.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: Local network data exposure
Action: Assess Impact
AI Analysis

Impact

A flaw in the Bluetooth Low Energy Handler of the Mendi Neurofeedback Headset V4 allows sensitive information to be transmitted in cleartext when a specific manipulation is performed. The vulnerability is categorized as high-complexity and difficult to exploit, but it remains a confidentiality risk because an attacker with local network access could intercept the data. It is associated with CWE‑310 (Cleartext Storage or Transmission) and CWE‑319 (Cleartext Transmission of Sensitive Information).

Affected Systems

The affected product is the Mendi Neurofeedback Headset Version 4. No other versions or products are listed as impacted. The vulnerability is tied to an unidentified functionality within the BLE component of this device.

Risk and Exploitability

The CVSS score of 2.3 indicates a low severity overall, and the EPSS score of less than 1% suggests that exploitation is unlikely at present. The device is not present in the CISA KEV catalog. Because the attack can only be performed from the local network, the risk is confined to environments where the headset is connected to a shared or untrusted LAN. Without an official patch, the primary threat is the potential for passive eavesdropping of sensitive data transmitted by the headset.

Generated by OpenCVE AI on April 16, 2026 at 04:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Configure the headset to pair only with authorized devices and disable the BLE handler when it is not in use.
  • Block or isolate the headset’s network interface using VLANs or firewall rules to prevent access from untrusted networks.
  • Set up network monitoring or intrusion detection to alert on cleartext BLE traffic that could contain sensitive information.
  • Check the Mendi website or contact support for a firmware update that addresses this issue, and apply it promptly when available.

Generated by OpenCVE AI on April 16, 2026 at 04:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Mendi
Mendi neurofeedback Headset
Vendors & Products Mendi
Mendi neurofeedback Headset

Sat, 07 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Mendi Neurofeedback Headset V4. Affected by this vulnerability is an unknown functionality of the component Bluetooth Low Energy Handler. Performing a manipulation results in cleartext transmission of sensitive information. The attack can only be performed from the local network. The attack's complexity is rated as high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Title Mendi Neurofeedback Headset Bluetooth Low Energy cleartext transmission
Weaknesses CWE-310
CWE-319
References
Metrics cvssV2_0

{'score': 1.8, 'vector': 'AV:A/AC:H/Au:N/C:P/I:N/A:N/E:ND/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.1, 'vector': 'CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:X/RL:X/RC:R'}

cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:X/RL:X/RC:R'}

cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Mendi Neurofeedback Headset
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T16:28:55.048Z

Reserved: 2026-02-18T09:19:04.704Z

Link: CVE-2026-2671

cve-icon Vulnrichment

Updated: 2026-03-11T16:13:15.339Z

cve-icon NVD

Status : Deferred

Published: 2026-03-07T18:16:05.873

Modified: 2026-04-22T21:27:27.950

Link: CVE-2026-2671

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:45:16Z

Weaknesses