An attacker could use data obtained by sniffing the network traffic to forge packets in order to make arbitrary requests to Contemporary Controls BASC 20T.
History

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Contemporary Controls
Contemporary Controls bascontrol20
Vendors & Products Contemporary Controls
Contemporary Controls bascontrol20

Thu, 09 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description An attacker could use data obtained by sniffing the network traffic to forge packets in order to make arbitrary requests to Contemporary Controls BASC 20T.
Title Contemporary Controls BASC 20T Reliance on Untrusted Inputs in a Security Decision
Weaknesses CWE-807
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2026-04-09T19:47:17.841Z

Updated: 2026-04-09T19:47:17.841Z

Reserved: 2025-12-02T21:00:14.794Z

Link: CVE-2025-13926

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-09T20:16:23.807

Modified: 2026-04-09T20:16:23.807

Link: CVE-2025-13926

cve-icon Redhat

No data.