PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-33569 Anviz CVE debrief

CVE-2026-33569 is a cleartext management exposure affecting Anviz CX2 Lite and CX7 products. CISA says administrative sessions occur over HTTP, allowing an on-path attacker to sniff credentials and session data and potentially compromise the device. The advisory was published on 2026-04-16 and notes that Anviz did not respond to CISA's coordination attempts.

Vendor
Anviz
Product
CX2 Lite Firmware
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-04-16
Original CVE updated
2026-04-16
Advisory published
2026-04-16
Advisory updated
2026-04-16

Who should care

Operators and administrators of Anviz CX2 Lite and CX7 deployments, especially if administrative access is reachable across shared, routed, or otherwise untrusted networks. OT/ICS defenders, network engineers, and incident responders should treat exposed management traffic as a priority.

Technical summary

The advisory describes administrative sessions using HTTP rather than a protected transport. That means credentials and session data may be readable by an on-path attacker. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N, which reflects remote network exposure with high confidentiality impact and no claimed integrity or availability impact. The source also includes SSVC v2 information indicating exploitability and automatable characteristics as not present in the provided notes.

Defensive priority

Medium severity overall, but high practical priority for any deployment where management traffic can be observed by parties outside a trusted admin network. Protecting administrative credentials and sessions should be addressed before routine maintenance windows if the devices are exposed beyond a tightly controlled segment.

Recommended defensive actions

  • Restrict device administration to a trusted management network and block access from broader user or vendor-facing networks.
  • Segment OT/ICS management paths so administrative traffic is not carried over shared or untrusted network segments.
  • Use a protected remote-access path such as a VPN or jump host for administration instead of direct exposure.
  • Review whether any credentials or sessions may have been exposed, and rotate administrative credentials if exposure is suspected.
  • Monitor for unexpected logins, configuration changes, or other device access anomalies.
  • Contact Anviz through the vendor contact page for remediation guidance and to check whether updated firmware or software is available.
  • Apply vendor updates or mitigations as soon as they are published and verify that administrative transport is protected before re-enabling normal access.

Evidence notes

Based only on the supplied CISA CSAF advisory and linked official references. The advisory title is 'Anviz Multiple Products' and the metadata identifies the affected products as Anviz CX2 Lite Firmware and CX7 Firmware/CrossChex Standard. CISA states that administrative sessions occur over HTTP, enabling on-path attackers to sniff credentials and session data. The advisory revision history shows initial publication on 2026-04-16. The remediation section notes that Anviz did not respond to CISA's coordination attempts. No exploit code, public attack details, or vendor-provided fix details were included in the supplied corpus.

Official resources

CISA published ICSA-26-106-03 on 2026-04-16 for CVE-2026-33569. The advisory states that Anviz did not respond to coordination attempts and provides only high-level mitigation guidance in the supplied corpus.