PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-32650 Anviz CVE debrief

CVE-2026-32650 is a high-severity credential exposure issue in Anviz CrossChex Standard. According to the CISA advisory, an attacker can manipulate the TDS7 PreLogin flow to disable encryption, which can send database credentials in plaintext and enable unauthorized database access. The supplied source does not indicate integrity or availability impact, but it does show a direct confidentiality risk to connected databases.

Vendor
Anviz
Product
CX2 Lite Firmware
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-04-16
Original CVE updated
2026-04-16
Advisory published
2026-04-16
Advisory updated
2026-04-16

Who should care

Administrators and operators using Anviz CrossChex Standard, especially in environments where the application connects to production databases or is reachable over untrusted or shared networks. Security teams responsible for ICS/OT-adjacent Windows or database-connected deployments should also review exposure.

Technical summary

The advisory describes a network-reachable weakness in the database connection negotiation path: manipulation of TDS7 PreLogin can disable encryption, causing credentials to traverse in plaintext. That creates a path to unauthorized database access if an attacker can intercept or influence the connection. The provided CVSS vector indicates network attack, low complexity, no privileges or user interaction, and a confidentiality-only impact profile (CVSS 3.1: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Defensive priority

High. Prioritize if CrossChex Standard can reach sensitive databases or if database traffic is not tightly segmented and monitored.

Recommended defensive actions

  • Contact Anviz through the official support channel listed in the advisory for remediation guidance and product-specific updates.
  • Inventory deployments of CrossChex Standard and any related Anviz products to confirm whether the affected software is in use.
  • Restrict network paths between the application and its database so only approved hosts can connect.
  • Verify that database connections are configured to require encryption and cannot be downgraded or disabled by an attacker.
  • Rotate database credentials if there is any chance they were exposed over a plaintext connection.
  • Monitor database authentication and connection logs for unusual login attempts or unexpected source hosts.
  • Apply CISA ICS recommended practices for segmentation, least privilege, and defense in depth.

Evidence notes

This debrief is based only on the supplied CISA CSAF advisory (ICSA-26-106-03 / CVE-2026-32650) and the official CVE/NVD resource links. The advisory text states that CrossChex Standard is vulnerable when TDS7 PreLogin is manipulated to disable encryption, resulting in plaintext database credentials and unauthorized database access. The source also states that Anviz did not respond to CISA's coordination attempts. No KEV listing is included in the supplied corpus. The vendor mapping in the provided metadata is low-confidence and marked for review, so product scope should be validated before operational actioning.

Official resources

Publicly disclosed by CISA on 2026-04-16 in the initial publication of advisory ICSA-26-106-03.