PatchSiren cyber security CVE debrief
CVE-2026-3323 Vega CVE debrief
CVE-2026-3323 is a HIGH-severity authentication weakness affecting Vega VEGAPULS 6X firmware. According to the NVD record and the referenced CERT VDE advisory, an unsecured configuration interface can allow unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes. NVD lists firmware versions 1.0.0 and 1.1.0 as vulnerable.
- Vendor
- Vega
- Product
- CVE-2026-3323
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-04-28
- Original CVE updated
- 2026-05-11
- Advisory published
- 2026-04-28
- Advisory updated
- 2026-05-11
Who should care
Administrators and security teams responsible for Vega VEGAPULS 6X devices running firmware 1.0.0 or 1.1.0, especially where configuration access could be reachable from untrusted networks.
Technical summary
The NVD record classifies this issue as CVSS 3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating a network-reachable problem that requires no privileges or user interaction and primarily impacts confidentiality. The referenced advisory maps the issue to CWE-306 and the affected CPEs in the corpus are Vega VEGAPULS 6X firmware 1.0.0 and 1.1.0.
Defensive priority
High. The issue is remotely reachable, requires no authentication, and can expose credential material, so exposed devices should be reviewed promptly.
Recommended defensive actions
- Inventory Vega VEGAPULS 6X deployments and confirm whether firmware 1.0.0 or 1.1.0 is in use.
- Restrict access to any configuration interface using segmentation, ACLs, VPNs, or other network controls if exposure exists.
- Follow the linked CERT VDE / Vega advisory and apply vendor-provided remediation or firmware updates if available.
- Rotate credentials and access codes that may have been exposed through the interface.
- Monitor for unauthorized access attempts against management or configuration services.
Evidence notes
The supplied corpus includes the NVD modified record dated 2026-05-11 and the original CVE publication date of 2026-04-28. NVD marks the vulnerability status as Analyzed, cites the severity vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, and references two third-party advisory links from CERT VDE: the advisory landing page and the machine-readable CSAF white record. The vulnerable CPE criteria in the corpus are limited to Vega VEGAPULS 6X firmware versions 1.0.0 and 1.1.0.
Official resources
-
CVE-2026-3323 CVE record
CVE.org
-
CVE-2026-3323 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Publicly disclosed through the CVE and NVD records, with third-party advisory references from CERT VDE/Vega in the supplied corpus. No KEV entry or ransomware association is present in the provided data.