Description
A vulnerability exists in SenseLive X3050’s web management interface in which password updates are not reliably applied due to improper handling of credential changes on the backend. After the device undergoes a factory restore using the SenseLive Config 2.0 tool, the interface may indicate that the password update was successful; however, the system may continue to accept the previous or default credentials, demonstrating that the password-change process is not consistently enforced. Even after a factory reset, attempted password changes may fail to propagate correctly.
Published: 2026-04-23
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Credential Compromise
Action: Contact Vendor
AI Analysis

Impact

A flaw in the SenseLive X3050 web management interface causes password changes to be inconsistently applied. After updating the password, the interface may report success while the system still accepts the old or default credentials, allowing an authenticated user to maintain or acquire privileged access. The weakness can lead to unauthorized control of the device and the data it handles.

Affected Systems

SenseLive X3050 devices, all firmware versions for which no specific affected-version information is provided in the advisory.

Risk and Exploitability

The CVSS score of 9.3 marks this as a high severity vulnerability, while the EPSS score of less than 1% indicates a low likelihood of current exploitation. It is not listed in CISA’s KEV catalog. The vulnerability is exploitable via the device’s web interface, which is typically reachable over a network; an attacker who has or can guess valid credentials can benefit from the ineffective password change process. No additional conditions are required beyond the ability to log in or reset the device using the vendor’s Config 2.0 tool.

Generated by OpenCVE AI on April 28, 2026 at 14:33 UTC.

Remediation

Vendor Solution

SenseLive did not respond to CISA's requests to coordinate. Affected users are encouraged to reach out to SenseLive for more information. https://senselive.io/contact


OpenCVE Recommended Actions

  • Contact SenseLive to request an updated firmware or guidance
  • Disable or restrict remote access to the web management interface while awaiting a fix
  • Implement network segmentation or a firewall rule to isolate the device from untrusted networks

Generated by OpenCVE AI on April 28, 2026 at 14:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Senselive x3500
Senselive x3500 Firmware
CPEs cpe:2.3:h:senselive:x3500:-:*:*:*:*:*:*:*
cpe:2.3:o:senselive:x3500_firmware:1.523:*:*:*:*:*:*:*
Vendors & Products Senselive x3500
Senselive x3500 Firmware

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Senselive
Senselive x3050
Vendors & Products Senselive
Senselive x3050

Fri, 24 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Description A vulnerability exists in SenseLive X3050’s web management interface in which password updates are not reliably applied due to improper handling of credential changes on the backend. After the device undergoes a factory restore using the SenseLive Config 2.0 tool, the interface may indicate that the password update was successful; however, the system may continue to accept the previous or default credentials, demonstrating that the password-change process is not consistently enforced. Even after a factory reset, attempted password changes may fail to propagate correctly.
Title SenseLive X3050 Insufficiently Protected Credentials
Weaknesses CWE-522
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Senselive X3050 X3500 X3500 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-04-24T18:18:50.532Z

Reserved: 2026-04-14T16:05:54.161Z

Link: CVE-2026-39462

cve-icon Vulnrichment

Updated: 2026-04-24T16:50:30.960Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T00:16:28.333

Modified: 2026-04-28T19:04:40.970

Link: CVE-2026-39462

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:45:16Z

Weaknesses