An attacker could use data obtained by sniffing the network traffic to
forge packets in order to make arbitrary requests to Contemporary
Controls BASC 20T.
Metrics
Affected Vendors & Products
References
History
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Contemporary Controls
Contemporary Controls bascontrol20 |
|
| Vendors & Products |
Contemporary Controls
Contemporary Controls bascontrol20 |
Thu, 09 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker could use data obtained by sniffing the network traffic to forge packets in order to make arbitrary requests to Contemporary Controls BASC 20T. | |
| Title | Contemporary Controls BASC 20T Reliance on Untrusted Inputs in a Security Decision | |
| Weaknesses | CWE-807 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published: 2026-04-09T19:47:17.841Z
Updated: 2026-04-09T19:47:17.841Z
Reserved: 2025-12-02T21:00:14.794Z
Link: CVE-2025-13926
No data.
Status : Received
Published: 2026-04-09T20:16:23.807
Modified: 2026-04-09T20:16:23.807
Link: CVE-2025-13926
No data.