Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior ship with default credentials that are not forced to be changed during installation or commissioning. An attacker who can reach the management interface can authenticate using the default credentials and gain administrative access, enabling unauthorized access to device configuration and data. | |
| Title | Tattile Smart+ / Vega / Basic <= 1.181.5 Default Credentials | |
| Weaknesses | CWE-1392 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-24T21:33:18.810Z
Reserved: 2026-02-13T17:28:43.054Z
Link: CVE-2026-26341
Updated: 2026-02-24T21:33:12.476Z
Status : Awaiting Analysis
Published: 2026-02-24T20:27:48.103
Modified: 2026-02-24T21:52:01.367
Link: CVE-2026-26341
No data.
OpenCVE Enrichment
No data.