CVE-2026-35064
Published: 24 April 2026
Summary
CVE-2026-35064 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Senselive X3500 Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Network Service Discovery (T1046); ranked at the 17.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires limiting critical functions like unauthenticated device discovery to only explicitly authorized actions without identification or authentication.
Mandates enforcement of access control policies that would gate management protocol discovery functions behind authentication, preventing unauthorized enumeration.
Implements boundary protection and network segmentation to restrict attacker access to the same network segment required for exploiting the unauthenticated discovery.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability exposes unauthenticated discovery of devices, identifiers, and management interfaces via the management protocol, directly enabling Network Service Discovery (T1046) for enumeration without credentials.
NVD Description
A vulnerability in SenseLive X3050’s management ecosystem allows unauthenticated discovery of deployed units through the vendor’s management protocol, enabling identification of device presence, identifiers, and management interfaces without requiring credentials. Because discovery functions are exposed by the underlying service rather…
more
than gated by authentication, an attacker on the same network segment can rapidly enumerate targeted devices.
Deeper analysisAI
CVE-2026-35064 is a vulnerability in SenseLive X3050’s management ecosystem that allows unauthenticated discovery of deployed units through the vendor’s management protocol. This flaw enables identification of device presence, identifiers, and management interfaces without requiring credentials, as the discovery functions are exposed by the underlying service rather than gated by authentication. The issue is classified under CWE-306 (Missing Authentication for Critical Function) with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact.
An unauthenticated attacker with access to the same network segment can exploit this vulnerability to rapidly enumerate targeted devices. Exploitation requires no privileges, user interaction, or special conditions beyond network reachability, allowing attackers to map out SenseLive X3050 deployments and their management interfaces for potential follow-on attacks.
The CISA ICS Advisory ICSA-26-111-12, available at https://www.cisa.gov/news-events/ics-advisories/icsa-26-111-12 and in CSAF format at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-111-12.json, provides further details on the vulnerability. Additional information and support can be obtained via the vendor contact page at https://senselive.io/contact.
Details
- CWE(s)