Cyber Posture

CVE-2026-35064

High

Published: 24 April 2026

Published
24 April 2026
Modified
28 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0006 17.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-35064 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Senselive X3500 Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Network Service Discovery (T1046); ranked at the 17.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Network Service Discovery (T1046). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires limiting critical functions like unauthenticated device discovery to only explicitly authorized actions without identification or authentication.

prevent

Mandates enforcement of access control policies that would gate management protocol discovery functions behind authentication, preventing unauthorized enumeration.

prevent

Implements boundary protection and network segmentation to restrict attacker access to the same network segment required for exploiting the unauthenticated discovery.

MITRE ATT&CK Enterprise TechniquesAI

T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
Why these techniques?

The vulnerability exposes unauthenticated discovery of devices, identifiers, and management interfaces via the management protocol, directly enabling Network Service Discovery (T1046) for enumeration without credentials.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability in SenseLive X3050’s management ecosystem allows unauthenticated discovery of deployed units through the vendor’s management protocol, enabling identification of device presence, identifiers, and management interfaces without requiring credentials. Because discovery functions are exposed by the underlying service rather…

more

than gated by authentication, an attacker on the same network segment can rapidly enumerate targeted devices.

Deeper analysisAI

CVE-2026-35064 is a vulnerability in SenseLive X3050’s management ecosystem that allows unauthenticated discovery of deployed units through the vendor’s management protocol. This flaw enables identification of device presence, identifiers, and management interfaces without requiring credentials, as the discovery functions are exposed by the underlying service rather than gated by authentication. The issue is classified under CWE-306 (Missing Authentication for Critical Function) with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact.

An unauthenticated attacker with access to the same network segment can exploit this vulnerability to rapidly enumerate targeted devices. Exploitation requires no privileges, user interaction, or special conditions beyond network reachability, allowing attackers to map out SenseLive X3050 deployments and their management interfaces for potential follow-on attacks.

The CISA ICS Advisory ICSA-26-111-12, available at https://www.cisa.gov/news-events/ics-advisories/icsa-26-111-12 and in CSAF format at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-111-12.json, provides further details on the vulnerability. Additional information and support can be obtained via the vendor contact page at https://senselive.io/contact.

Details

CWE(s)

Affected Products

senselive
x3500 firmware
1.523

CVEs Like This One

CVE-2026-40620Same product: Senselive X3500
CVE-2026-27843Same product: Senselive X3500
CVE-2026-40630Same product: Senselive X3500
CVE-2026-39462Same product: Senselive X3500
CVE-2026-40623Same product: Senselive X3500
CVE-2026-35503Same product: Senselive X3500
CVE-2026-27841Same product: Senselive X3500
CVE-2025-34218Shared CWE-306
CVE-2026-34732Shared CWE-306
CVE-2025-24865Shared CWE-306

References