Project Subscriptions
No data.
No advisories yet.
Solution
SenseLive did not respond to CISA's requests to coordinate. Affected users are encouraged to reach out to SenseLive for more information. https://senselive.io/contact
Workaround
No workaround given by the vendor.
Fri, 24 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability exists in SenseLive X3050’s web management interface in which password updates are not reliably applied due to improper handling of credential changes on the backend. After the device undergoes a factory restore using the SenseLive Config 2.0 tool, the interface may indicate that the password update was successful; however, the system may continue to accept the previous or default credentials, demonstrating that the password-change process is not consistently enforced. Even after a factory reset, attempted password changes may fail to propagate correctly. | |
| Title | SenseLive X3050 Insufficiently Protected Credentials | |
| Weaknesses | CWE-522 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-04-23T23:52:16.129Z
Reserved: 2026-04-14T16:05:54.161Z
Link: CVE-2026-39462
No data.
Status : Received
Published: 2026-04-24T00:16:28.333
Modified: 2026-04-24T00:16:28.333
Link: CVE-2026-39462
No data.
OpenCVE Enrichment
No data.