๐Ÿ” CVE Alert

CVE-2026-3323

HIGH 7.5

VEGA: Privilege escalation through unsecured configuration interface in VEGAPULS devices

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

An unsecured configuration interface on affected devices allows unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes.

CWE CWE-306
Vendor vega grieshaber
Product vegapuls 6x two-wire profinet, modbus tcp, opc ua (ethernet-apl)
Published Apr 28, 2026
Last Updated Apr 28, 2026
Stay Ahead of the Next One

Get instant alerts for vega grieshaber vegapuls 6x two-wire profinet, modbus tcp, opc ua (ethernet-apl)

Be the first to know when new high vulnerabilities affecting vega grieshaber vegapuls 6x two-wire profinet, modbus tcp, opc ua (ethernet-apl) are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

VEGA Grieshaber / VEGAPULS 6X Two-wire PROFINET, Modbus TCP, OPC UA (Ethernet-APL)
1.0.0
VEGA Grieshaber / VEGAPULS 6X Two-wire PROFINET, Modbus TCP, OPC UA (Ethernet-APL)
1.1.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
certvde.com: https://certvde.com/en/advisories/VDE-2026-016 vega.csaf-tp.certvde.com: https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-016.json

Credits

Product Security Unit at VEGA Grieshaber KG