🔐 CVE Alert

CVE-2026-39462

HIGH 8.1

SenseLive X3050 Insufficiently Protected Credentials

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability exists in SenseLive X3050’s web management interface in which password updates are not reliably applied due to improper handling of credential changes on the backend. After the device undergoes a factory restore using the SenseLive Config 2.0 tool, the interface may indicate that the password update was successful; however, the system may continue to accept the previous or default credentials, demonstrating that the password-change process is not consistently enforced. Even after a factory reset, attempted password changes may fail to propagate correctly.

CWE CWE-522
Vendor senselive
Product x3050
Published Apr 23, 2026
Stay Ahead of the Next One

Get instant alerts for senselive x3050

Be the first to know when new high vulnerabilities affecting senselive x3050 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

SenseLive / X3050
V1.523

References

NVD ↗ CVE.org ↗ EPSS Data ↗
cisa.gov: https://www.cisa.gov/news-events/ics-advisories/icsa-26-111-12 senselive.io: https://senselive.io/contact github.com: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-111-12.json

Credits

Jithin Nambiar J reported these vulnerabilities to CISA.