PatchSiren

SenseLive CVE debriefs

These pages are published after PatchSiren validates generated defensive summaries against stored public CVE and source evidence.

CRITICAL SenseLive CVE published 2026-04-21

CVE-2026-40630

CVE-2026-40630 is a critical access-control flaw in the SenseLive X3050 web management interface. According to the CISA advisory, a network attacker may bypass the intended authentication mechanism and interact with sensitive configuration functions.

HIGH SenseLive CVE published 2026-04-21

CVE-2026-40623

CVE-2026-40623 affects the SenseLive X3050 V1.523 web management interface. The advisory says sensitive system and network settings can be changed without sufficient validation and safety controls, including IP addressing, watchdog timers, reconnect intervals, and service ports. Because these settings influence core behavior and recovery, unsafe values can destabilize the device or leave it persistently unavailable.

CRITICAL SenseLive CVE published 2026-04-21

CVE-2026-40620

CVE-2026-40620 is a critical weakness in the SenseLive X3050 embedded management service. According to the CISA advisory, any reachable host can establish a management connection and gain full administrative control of the SenseLive config application without authentication or authorization. That access can be used to alter critical configuration parameters, operational modes, and device state. For OT/ICS [truncated]

MEDIUM SenseLive CVE published 2026-04-21

CVE-2026-40431

CVE-2026-40431 describes an information exposure issue in the SenseLive X3050 web management interface. According to CISA’s advisory, administrative communication is sent over unencrypted HTTP, so authentication attempts and configuration data can be observed in cleartext by an attacker on the same network segment. The advisory was published on 2026-04-21 and does not indicate Known Exploited Vulnerability status.

HIGH SenseLive CVE published 2026-04-21

CVE-2026-39462

CVE-2026-39462 affects the SenseLive X3050 web management interface. According to CISA’s advisory, password updates are not reliably enforced after a factory restore or reset, and the device may continue to accept previous or default credentials even when the interface shows the change succeeded. Because the issue impacts authentication on a network-accessible management interface, it can leave administra [truncated]

CRITICAL SenseLive CVE published 2026-04-21

CVE-2026-35503

CVE-2026-35503 is a critical weakness in the SenseLive X3050 V1.523 web management interface. According to CISA, the authentication logic is performed on the client side with hardcoded values in browser-executed scripts instead of being verified server-side. That design allows someone who can access the login page to recover the exposed parameters and gain unauthorized administrative access. Because the i [truncated]

HIGH SenseLive CVE published 2026-04-21

CVE-2026-35064

CVE-2026-35064 is a high-severity reconnaissance issue in the SenseLive X3050 management ecosystem. According to the CISA CSAF advisory published on 2026-04-21T06:00:00Z, the vendor management protocol exposes discovery functions without authentication, allowing an attacker on the same network segment to identify deployed units, device identifiers, and management interfaces. The source does not describe c [truncated]

CRITICAL SenseLive CVE published 2026-04-21

CVE-2026-27843

CVE-2026-27843 is a critical availability issue in SenseLive X3050 V1.523’s web management interface. According to CISA’s advisory, the interface permits critical configuration parameters to be changed without sufficient authentication or server-side validation. An attacker can apply disruptive values to recovery and network settings, driving the gateway into a persistent lockout state. Because the device [truncated]

HIGH SenseLive CVE published 2026-04-21

CVE-2026-27841

CVE-2026-27841 is a high-severity CSRF issue in the SenseLive X3050 V1.523 web management interface. The advisory says the application does not validate request origin or use CSRF tokens, so a malicious external webpage could cause a logged-in user’s browser to submit unauthorized configuration changes. In practical terms, this is an integrity-focused risk for device administration and can also affect ava [truncated]

CRITICAL SenseLive CVE published 2026-04-21

CVE-2026-25775

CVE-2026-25775 is a critical network-reachable flaw in SenseLive X3050 V1.523's remote management service. According to CISA's advisory, the service accepts firmware-related requests from any reachable host and does not enforce authentication, authorization, image integrity, or firmware authenticity checks.

MEDIUM SenseLive CVE published 2026-04-21

CVE-2026-25720

CVE-2026-25720 affects the SenseLive X3050 V1.523 web management interface. Because authenticated sessions may remain valid longer than intended, a person with access to an already-authenticated session could keep using administrative functions after legitimate user activity has ended.