{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-26341","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2026-02-13T17:28:43.054Z","datePublished":"2026-02-24T18:40:54.212Z","dateUpdated":"2026-03-05T01:31:06.767Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Smart+","vendor":"Tattile s.r.l.","versions":[{"lessThanOrEqual":"1.181.5","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Tolling+","vendor":"Tattile s.r.l.","versions":[{"lessThanOrEqual":"1.181.5","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Smart+ Speed","vendor":"Tattile s.r.l.","versions":[{"lessThanOrEqual":"1.181.5","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Smart+ Traffic Light","vendor":"Tattile s.r.l.","versions":[{"lessThanOrEqual":"1.181.5","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Axle Counter","vendor":"Tattile s.r.l.","versions":[{"lessThanOrEqual":"1.181.5","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Vega53","vendor":"Tattile s.r.l.","versions":[{"lessThanOrEqual":"1.181.5","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Vega33","vendor":"Tattile s.r.l.","versions":[{"lessThanOrEqual":"1.181.5","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Vega11","vendor":"Tattile s.r.l.","versions":[{"lessThanOrEqual":"1.181.5","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"Basic MK2","vendor":"Tattile s.r.l.","versions":[{"lessThanOrEqual":"1.181.5","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"ANPR Mobile","vendor":"Tattile s.r.l.","versions":[{"lessThanOrEqual":"1.181.5","status":"affected","version":"0","versionType":"semver"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:iptime:smart_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.181.5"}]}]}],"credits":[{"lang":"en","type":"finder","value":"Gjoko Krstic of Zero Science Lab"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior ship with default credentials that are not forced to be changed during installation or commissioning. An attacker who can reach the management interface can authenticate using the default credentials and gain administrative access, enabling unauthorized access to device configuration and data."}],"value":"Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior ship with default credentials that are not forced to be changed during installation or commissioning. An attacker who can reach the management interface can authenticate using the default credentials and gain administrative access, enabling unauthorized access to device configuration and data."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.3,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1392","description":"CWE-1392 Use of Default Credentials","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-03-05T01:31:06.767Z"},"references":[{"tags":["technical-description","exploit"],"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5977.php"},{"tags":["product"],"url":"https://www.tattile.com/"},{"tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/tattile-smart-vega-basic-default-credentials"}],"source":{"discovery":"EXTERNAL"},"title":"Tattile Smart+ / Vega / Basic <= 1.181.5 Default Credentials","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-24T21:32:49.052176Z","id":"CVE-2026-26341","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-24T21:33:18.810Z"}}]}}