Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior implement an authentication token (X-User-Token) with insufficient expiration. An attacker who obtains a valid token (for example via interception, log exposure, or token reuse on a shared system) can continue to authenticate to the management interface until the token is revoked, enabling unauthorized access to device functions and data.
Metrics
Affected Vendors & Products
References
History
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Iptime
Iptime smart Firmware |
|
| CPEs | cpe:2.3:o:iptime:smart_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Iptime
Iptime smart Firmware |
Fri, 27 Feb 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tattile anpr Mobile Firmware
Tattile axle Counter Firmware Tattile basic Mk2 Firmware Tattile smart\+ Tattile smart\+ Firmware Tattile smart\+ Speed Tattile smart\+ Speed Firmware Tattile smart\+ Traffic Light Tattile smart\+ Traffic Light Firmware Tattile tolling\+ Tattile tolling\+ Firmware Tattile vega11 Firmware Tattile vega33 Firmware Tattile vega53 Firmware |
|
| CPEs | cpe:2.3:h:tattile:anpr_mobile:-:*:*:*:*:*:*:* cpe:2.3:h:tattile:axle_counter:-:*:*:*:*:*:*:* cpe:2.3:h:tattile:basic_mk2:-:*:*:*:*:*:*:* cpe:2.3:h:tattile:smart\+:-:*:*:*:*:*:*:* cpe:2.3:h:tattile:smart\+_speed:-:*:*:*:*:*:*:* cpe:2.3:h:tattile:smart\+_traffic_light:-:*:*:*:*:*:*:* cpe:2.3:h:tattile:tolling\+:-:*:*:*:*:*:*:* cpe:2.3:h:tattile:vega11:-:*:*:*:*:*:*:* cpe:2.3:h:tattile:vega33:-:*:*:*:*:*:*:* cpe:2.3:h:tattile:vega53:-:*:*:*:*:*:*:* cpe:2.3:o:tattile:anpr_mobile_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tattile:axle_counter_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tattile:basic_mk2_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tattile:smart\+_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tattile:smart\+_speed_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tattile:smart\+_traffic_light_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tattile:tolling\+_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tattile:vega11_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tattile:vega33_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tattile:vega53_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tattile anpr Mobile Firmware
Tattile axle Counter Firmware Tattile basic Mk2 Firmware Tattile smart\+ Tattile smart\+ Firmware Tattile smart\+ Speed Tattile smart\+ Speed Firmware Tattile smart\+ Traffic Light Tattile smart\+ Traffic Light Firmware Tattile tolling\+ Tattile tolling\+ Firmware Tattile vega11 Firmware Tattile vega33 Firmware Tattile vega53 Firmware |
|
| Metrics |
cvssV3_1
|
Thu, 26 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Feb 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tattile
Tattile anpr Mobile Tattile axle Counter Tattile basic Mk2 Tattile smart+ Tattile smart+ Speed Tattile smart+ Traffic Light Tattile tolling+ Tattile vega11 Tattile vega33 Tattile vega53 |
|
| Vendors & Products |
Tattile
Tattile anpr Mobile Tattile axle Counter Tattile basic Mk2 Tattile smart+ Tattile smart+ Speed Tattile smart+ Traffic Light Tattile tolling+ Tattile vega11 Tattile vega33 Tattile vega53 |
Tue, 24 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior implement an authentication token (X-User-Token) with insufficient expiration. An attacker who obtains a valid token (for example via interception, log exposure, or token reuse on a shared system) can continue to authenticate to the management interface until the token is revoked, enabling unauthorized access to device functions and data. | |
| Title | Tattile Smart+ / Vega / Basic <= 1.181.5 Insufficient Session Token Expiration | |
| Weaknesses | CWE-613 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-02-24T18:41:09.935Z
Updated: 2026-03-05T01:31:07.547Z
Reserved: 2026-02-13T17:28:43.054Z
Link: CVE-2026-26342
Updated: 2026-02-26T19:57:38.964Z
Status : Analyzed
Published: 2026-02-24T20:27:48.310
Modified: 2026-02-27T03:10:51.703
Link: CVE-2026-26342
No data.