PatchSiren cyber security CVE debrief
CVE-2026-3893 Raw CVE debrief
CVE-2026-3893 is a critical authentication failure in the Carlson Software VASCO-B GNSS Receiver <1.4.0. According to the CISA advisory, the device lacks an authentication mechanism, so an attacker with network access can directly access and modify configuration and operational functions without credentials. Carlson Software recommends updating to Version 1.4.0 or later.
- Vendor
- Raw
- Product
- Carlson Software VASCO-B GNSS Receiver <1.4.0
- CVSS
- CRITICAL 9.4
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-04-23
- Original CVE updated
- 2026-04-23
- Advisory published
- 2026-04-23
- Advisory updated
- 2026-04-23
Who should care
Organizations that deploy or manage Carlson VASCO-B GNSS receivers, along with OT/ICS security teams responsible for network segmentation, device hardening, and change control, should treat this as a high-priority issue. Any environment where the receiver is reachable from a broader network should be reviewed first.
Technical summary
The advisory describes a network-reachable missing-authentication condition on the Carlson VASCO-B GNSS Receiver <1.4.0. Because no authentication is required, an attacker with network access may alter configuration and operational behavior directly. The advisory lists CVSS v3.1 9.4 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H) and recommends upgrading to version 1.4.0 or greater.
Defensive priority
High. This is an unauthenticated network-access issue affecting operational technology equipment, with potential integrity and availability impact. If the receiver is exposed to untrusted or shared networks, remediation should be prioritized immediately.
Recommended defensive actions
- Upgrade Carlson VASCO-B GNSS Receiver to version 1.4.0 or greater per the vendor recommendation.
- Restrict network access to the receiver so only necessary management hosts and segments can reach it.
- Review device configuration and access paths for any unexpected changes or unauthorized operational modifications.
- Apply OT network segmentation and defense-in-depth controls around the receiver and its management interfaces.
- Validate whether any compensating controls are in place where immediate upgrading is not yet possible.
Evidence notes
The source advisory (ICSA-26-113-02) states that the Carlson VASCO-B GNSS Receiver lacks an authentication mechanism and that a network attacker can access and modify configuration and operational functions without credentials. The advisory was initially published on 2026-04-23T06:00:00Z. The provided source corpus includes no KEV listing for this CVE.
Official resources
-
CVE-2026-3893 CVE record
CVE.org
-
CVE-2026-3893 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA ICS advisory ICSA-26-113-02 was initially published on 2026-04-23T06:00:00.000Z. The source corpus shows no Known Exploited Vulnerabilities (KEV) entry for this CVE.