on‑path attackers to sniff credentials and session data, which can be
used to compromise the device.
No analysis available yet.
Vendor Workaround
Anviz did not respond to CISA's attempts to coordinate these vulnerabilities. Users should contact Anviz for more information at https://www.anviz.com/contact-us.html.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 17 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anviz
Anviz anviz Cx2 Lite Firmware Anviz anviz Cx7 Firmware |
|
| Vendors & Products |
Anviz
Anviz anviz Cx2 Lite Firmware Anviz anviz Cx7 Firmware |
Fri, 17 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Anviz CX2 Lite and CX7 administrative sessions occur over HTTP, enabling on‑path attackers to sniff credentials and session data, which can be used to compromise the device. | |
| Title | Anviz Products Cleartext Transmission of Sensitive Information | |
| Weaknesses | CWE-319 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-04-17T20:32:48.104Z
Reserved: 2026-04-14T15:42:14.069Z
Link: CVE-2026-33569
Updated: 2026-04-17T20:32:40.934Z
Status : Received
Published: 2026-04-17T20:16:34.847
Modified: 2026-04-17T20:16:34.847
Link: CVE-2026-33569
No data.
OpenCVE Enrichment
Updated: 2026-04-17T20:40:01Z