PatchSiren cyber security CVE debrief
CVE-2026-26049 Jinan USR IOT Technology Limited (PUSR) CVE debrief
CVE-2026-26049 affects Jinan USR IOT Technology Limited (PUSR) USR-W610 devices up to version 3.1.1.0. According to CISA’s advisory, the web management interface renders the password in a plaintext input field, which can expose administrator credentials to anyone who can view the UI directly or indirectly. CISA published the advisory on 2026-02-19 with a Medium CVSS 3.1 score of 5.7. The vendor statement included in the advisory says the product is end-of-life and there is no plan to patch it.
- Vendor
- Jinan USR IOT Technology Limited (PUSR)
- Product
- USR-W610
- CVSS
- MEDIUM 5.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-02-19
- Original CVE updated
- 2026-02-19
- Advisory published
- 2026-02-19
- Advisory updated
- 2026-02-19
Who should care
OT/ICS operators, site administrators, and security teams responsible for PUSR USR-W610 devices, especially where the web management interface is accessible to shared workstations, remote support personnel, or other users who could observe the screen or capture it.
Technical summary
The issue is a credential-disclosure problem in the device’s web management UI: the current password is shown in a plaintext input field instead of being masked. That creates a risk of unauthorized observation through shoulder surfing, screenshots, or browser/UI caching artifacts. The advisory maps the weakness to CWE-522 and lists a CVSS 3.1 vector of AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N, reflecting a confidentiality impact without direct integrity or availability effects. The supplied remediation notes also state the product is end-of-life and not planned for patching.
Defensive priority
Medium-high. The vulnerability does not provide code execution, but it can expose administrative credentials, which may enable follow-on access if those credentials are reused or remain valid. Priority increases in environments where the device is administered from shared, remote, or monitored workspaces and where no vendor fix is available.
Recommended defensive actions
- Inventory any PUSR USR-W610 devices and confirm whether they are at or below version 3.1.1.0.
- Restrict access to the web management interface to trusted administrative networks and authorized users only.
- Use administrative workstations and viewing conditions that reduce the chance of screen observation or screen capture.
- Treat exposed passwords as potentially compromised and rotate affected credentials according to local policy.
- Review whether any credentials used on the device are reused elsewhere and replace them if necessary.
- Because the vendor states the product is end-of-life, plan for compensating controls and eventual replacement rather than expecting a patch.
- Apply ICS defense-in-depth and recommended practices from CISA to limit the blast radius of management-plane exposure.
Evidence notes
This debrief is based only on the supplied CISA CSAF advisory data for ICSA-26-050-03 / CVE-2026-26049. The advisory states that the web management interface renders passwords in a plaintext input field and explicitly cites exposure via shoulder surfing, screenshots, or browser form caching. The remediation section says PUSR stated the product is end-of-life and there are no plans to patch. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N, and the SSVC note indicates Exploitation: None and Automatable: None as provided in the source corpus. Vendor/product naming confidence in the prompt is low, so the product identification should be treated as advisory-sourced rather than independently validated here.
Official resources
-
CVE-2026-26049 CVE record
CVE.org
-
CVE-2026-26049 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA CSAF advisory ICSA-26-050-03 was published on 2026-02-19 and identified the issue as CVE-2026-26049. The supplied advisory history shows an initial publication only, with no later revision in the provided corpus.