PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-32324 Anviz CVE debrief

CISA published ICSA-26-106-03 on 2026-04-16 for CVE-2026-32324, affecting Anviz CX2 Lite Firmware, CX7 Firmware, and CrossChex Standard. The advisory says the application embeds reusable certificate/key material, which can enable decryption of MQTT traffic and potential interaction with device messaging channels at scale. CISA rates the issue HIGH with a CVSS 3.1 score of 7.7.

Vendor
Anviz
Product
CX2 Lite Firmware
CVSS
HIGH 7.7
CISA KEV
Not listed in stored evidence
Original CVE published
2026-04-16
Original CVE updated
2026-04-16
Advisory published
2026-04-16
Advisory updated
2026-04-16

Who should care

Operators and administrators responsible for Anviz CX2 Lite Firmware, CX7 Firmware, and CrossChex Standard, especially in industrial or access-control environments using MQTT or similar device messaging paths.

Technical summary

The source advisory identifies reusable certificate/key material embedded in the application. That design can undermine message confidentiality because traffic protected with those materials may be decrypted, and it may also permit interaction with device messaging channels at scale. The supplied CVSS vector is CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N, and the advisory references CWE-321.

Defensive priority

High. The issue can expose sensitive device communications and create unauthorized messaging risk, with high confidentiality and integrity impact in the advisory scoring.

Recommended defensive actions

  • Contact Anviz for vendor guidance using the advisory-linked contact page.
  • Inventory affected deployments of CX2 Lite Firmware, CX7 Firmware, and CrossChex Standard.
  • Rotate and reissue any exposed certificate/key material where operationally feasible.
  • Restrict access to MQTT and related device messaging paths to trusted hosts and networks.
  • Segment affected systems and monitor for unexpected message traffic or control activity.
  • Follow CISA industrial control system recommended practices for hardening and defense in depth.

Evidence notes

This debrief is based on the supplied CISA CSAF source item for ICSA-26-106-03, which was published and modified on 2026-04-16. The advisory text explicitly states that CX7 embeds reusable certificate/key material and cites CWE-321. The supplied corpus does not identify this CVE as a KEV entry, and it notes that Anviz did not respond to CISA's coordination attempts.

Official resources

Publicly disclosed by CISA in ICSA-26-106-03 on 2026-04-16; the CVE and source advisory share the same publication date in the supplied corpus.