Description
A vulnerability in 
SenseLive

X3050’s web management interface allows unauthorized access to certain configuration endpoints due to improper access control enforcement. An attacker with network access to the device may be able to bypass the intended authentication mechanism and directly interact with sensitive configuration functions.
Published: 2026-04-23
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Contact Vendor
AI Analysis

Impact

A weakness in the web management interface of SenseLive X3050 permits an attacker with network access to bypass authentication controls and call configuration endpoints that are meant to be protected. This unauthorized access could allow the attacker to read, modify, or delete device settings, potentially compromising the confidentiality, integrity, or availability of the equipment and the network it supports. The flaw is identified as a weakness in authentication and authorization enforcement, corresponding to CWE‑288.

Affected Systems

The vulnerability affects the SenseLive X3050 industrial device. No specific firmware or software version ranges are provided, so any installed instance of the X3050 that exposes the web management interface is potentially impacted.

Risk and Exploitability

The CVSS score is 9.3, indicating critical severity. The EPSS score of less than 1% suggests that exploitation likelihood is very low at present, and the flaw is not listed in CISA’s KEV catalog. The attack requires network access to the device, and the attacker can simply send web requests to the unauthorized endpoints to read or change configuration data. Attackers do not need special privileges on the host, so the risk to the broader network depends on how the management interface is exposed.

Generated by OpenCVE AI on April 28, 2026 at 14:34 UTC.

Remediation

Vendor Solution

SenseLive did not respond to CISA's requests to coordinate. Affected users are encouraged to reach out to SenseLive for more information. https://senselive.io/contact


OpenCVE Recommended Actions

  • Contact SenseLive via https://senselive.io/contact for further instructions or updates regarding the vulnerability.
  • Restrict network access to the device’s web management interface using firewall rules or VLAN segmentation so that only trusted administrators can reach it.
  • Monitor the device’s web interface traffic for unauthorized configuration requests and review logs regularly to detect any attempted abuse.

Generated by OpenCVE AI on April 28, 2026 at 14:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Senselive x3500
Senselive x3500 Firmware
CPEs cpe:2.3:h:senselive:x3500:-:*:*:*:*:*:*:*
cpe:2.3:o:senselive:x3500_firmware:1.523:*:*:*:*:*:*:*
Vendors & Products Senselive x3500
Senselive x3500 Firmware

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Senselive
Senselive x3050
Vendors & Products Senselive
Senselive x3050

Fri, 24 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in  SenseLive X3050’s web management interface allows unauthorized access to certain configuration endpoints due to improper access control enforcement. An attacker with network access to the device may be able to bypass the intended authentication mechanism and directly interact with sensitive configuration functions.
Title SenseLive X3050 Authentication bypass using an alternate path or channel
Weaknesses CWE-288
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Senselive X3050 X3500 X3500 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-04-24T13:11:46.041Z

Reserved: 2026-04-14T16:05:54.127Z

Link: CVE-2026-40630

cve-icon Vulnrichment

Updated: 2026-04-24T13:11:42.873Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T00:16:29.040

Modified: 2026-04-28T19:01:59.677

Link: CVE-2026-40630

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:45:16Z

Weaknesses