PatchSiren cyber security CVE debrief
CVE-2026-32958 Raw CVE debrief
CVE-2026-32958 is a hard-coded cryptographic key issue in Silex Technology SD-330AC and AMC Manager. According to CISA’s advisory, the flaw could cause an administrative user to be directed to apply a fake firmware update. Vendor fixes are available, and CISA also recommends protecting the settings web interface with a password.
- Vendor
- Raw
- Product
- Silex Technology SD-330AC <=1.42 AMC Manager <=5.0.2
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-04-21
- Original CVE updated
- 2026-04-21
- Advisory published
- 2026-04-21
- Advisory updated
- 2026-04-21
Who should care
Administrators and operators using Silex Technology SD-330AC devices or AMC Manager, especially teams responsible for firmware updates and settings web interface access in OT/ICS or similar managed environments.
Technical summary
The source advisory describes a use of hard-coded cryptographic key vulnerability affecting Silex Technology SD-330AC firmware up to and including 1.42 and AMC Manager up to and including 5.0.2. The stated impact is that an administrative user could be directed to apply a fake firmware update. The supplied CVSS v3.1 vector is AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N, which aligns with network reachability, no privileges required, user interaction required, and high integrity impact.
Defensive priority
Medium, with higher urgency for environments that routinely use the affected firmware update or settings interfaces.
Recommended defensive actions
- Update SD-330AC firmware to version 1.50 or later.
- Update AMC Manager to version 5.1.0 or later.
- Set a password for the settings web interface, as recommended in the advisory.
- Review the linked CISA and JPCERT/CC advisories for the vendor’s full remediation guidance.
Evidence notes
This debrief is based on CISA CSAF advisory ICSA-26-111-10 and the supplied CVE record. The source states that CVE-2026-32958 affects SD-330AC firmware <=1.42 and AMC Manager <=5.0.2, and that the issue could direct an administrative user to apply a fake firmware update. The advisory provides CVSS v3.1 AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N (6.5, MEDIUM) and an SSVCv2 line. No KEV entry was supplied. The vendor mapping in the source is marked low-confidence/needs review, so product naming should be validated against the official advisory if used operationally.
Official resources
-
CVE-2026-32958 CVE record
CVE.org
-
CVE-2026-32958 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Initial public disclosure occurred on 2026-04-21 UTC via CISA CSAF advisory ICSA-26-111-10; the CVE was published and modified the same day.