[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-39462":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-24T12:20:52.508Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":71,"aliases":72,"duplicate_of":9,"upstream":73,"downstream":74,"duplicates":75,"related":76,"reserved_at":9,"published_at":77,"modified_at":77,"state":78,"summary":79,"references_raw":86,"kevs":100,"epss":9,"epss_history":101,"metrics":102,"affected":116},"CVE-2026-39462","A vulnerability exists in SenseLive X3050’s web management interface in which password updates are not reliably applied due to improper handling of credential changes on the backend. After the device undergoes a factory restore using the SenseLive Config 2.0 tool, the interface may indicate that the password update was successful; however, the system may continue to accept the previous or default credentials, demonstrating that the password-change process is not consistently enforced. Even after a factory reset, attempted password changes may fail to propagate correctly.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":9,"capec":18},"CWE-522","Insufficiently Protected Credentials","The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.","weakness","Incomplete","Class",[19,23,27,31,35,39,43,47,51,55,59,63,67],{"id":20,"name":21,"techniques":22},"CAPEC-102","Session Sidejacking",[],{"id":24,"name":25,"techniques":26},"CAPEC-474","Signature Spoofing by Key Theft",[],{"id":28,"name":29,"techniques":30},"CAPEC-50","Password Recovery Exploitation",[],{"id":32,"name":33,"techniques":34},"CAPEC-509","Kerberoasting",[],{"id":36,"name":37,"techniques":38},"CAPEC-551","Modify Existing Service",[],{"id":40,"name":41,"techniques":42},"CAPEC-555","Remote Services with Stolen Credentials",[],{"id":44,"name":45,"techniques":46},"CAPEC-560","Use of Known Domain Credentials",[],{"id":48,"name":49,"techniques":50},"CAPEC-561","Windows Admin Shares with Stolen Credentials",[],{"id":52,"name":53,"techniques":54},"CAPEC-600","Credential Stuffing",[],{"id":56,"name":57,"techniques":58},"CAPEC-644","Use of Captured Hashes (Pass The Hash)",[],{"id":60,"name":61,"techniques":62},"CAPEC-645","Use of Captured Tickets (Pass The Ticket)",[],{"id":64,"name":65,"techniques":66},"CAPEC-652","Use of Known Kerberos Credentials",[],{"id":68,"name":69,"techniques":70},"CAPEC-653","Use of Known Operating System Credentials",[],[],[],[],[],[],[],"2026-04-23T23:52:16.129Z","Received",{"cisa_kev":80,"cisa_ransomware":80,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":81,"severity_score":82,"severity_version":83,"severity_source":84,"severity_vector":85,"severity_status":78},false,"critical",9.3,"v4.0","cve.org","CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",[87,92,96],{"url":88,"sources":89,"tags":91},"https://www.cisa.gov/news-events/ics-advisories/icsa-26-111-12",[84,90],"nvd",[],{"url":93,"sources":94,"tags":95},"https://senselive.io/contact",[84,90],[],{"url":97,"sources":98,"tags":99},"https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-111-12.json",[84,90],[],[],[],[103,112],{"source":84,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":104,"cvss_v4_0":110},{"baseScore":105,"baseSeverity":106,"vectorString":107,"impactScore":108,"exploitabilityScore":109},8.1,"HIGH","CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",9.8,5.6,{"baseScore":82,"baseSeverity":111,"vectorString":85,"impactScore":9,"exploitabilityScore":9},"CRITICAL",{"source":90,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":113,"cvss_v4_0":114},{"baseScore":105,"baseSeverity":106,"vectorString":107,"impactScore":108,"exploitabilityScore":109},{"baseScore":82,"baseSeverity":111,"vectorString":115,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[117],{"ecosystem":9,"name":118,"vendor":119,"product":120,"cpe_part":121,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":122},"X3050","senselive","x3050","a",[123],{"version":124,"is_range":80,"range_type":84,"version_start":124,"version_start_type":125,"version_end":124,"version_end_type":125,"fixed_in":9},"V1.523","including"]