CVE-2026-26342

🚨 CRITICAL

Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior implement an authentication token (X-User-Token) with insufficient expiration. An attacker who obtains a valid token...

Published
Feb 24, 2026
Last Modified
Feb 27, 2026
Views
2
Bookmarks
0

Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior implement an authentication token (X-User-Token) with insufficient expiration. An attacker who obtains a valid token (for example via interception, log exposure, or token reuse on a shared system) can continue to authenticate to the management interface until the token is revoked, enabling unauthorized access to device functions and data.

Affected Products (10)

tattile - smart\+_firmware

Version: *

tattile - tolling\+_firmware

Version: *

tattile - smart\+_speed_firmware

Version: *

tattile - smart\+_traffic_light_firmware

Version: *

tattile - axle_counter_firmware

Version: *

tattile - vega53_firmware

Version: *

tattile - vega33_firmware

Version: *

tattile - vega11_firmware

Version: *

tattile - basic_mk2_firmware

Version: *

tattile - anpr_mobile_firmware

Version: *

CVSS Scores

CVSS 3.1 9.8
9.8
CRITICAL
CVSS 2.0 9.8

Additional Information

Source
disclosure@vulncheck.com
State
Analyzed

Share CVE-2026-26342

Share on Social Media

Copy Link

Embed Code

Request Expert Analysis

Request a professional security analysis for CVE-2026-26342 from our verified experts.

Credits System

Use your credits to get expert analysis from verified security professionals. Purchase more credits anytime!

Add 3 credits for accelerated delivery

Base Cost: 8 credits
Priority Upgrade: + credits
SLA Acceleration: +3 credits
Total Cost:
Your Balance:

Insufficient Credits

You need more credits to submit this request.

Buy Credits

Report Analysis