{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-31851","assignerOrgId":"309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c","state":"PUBLISHED","assignerShortName":"TuranSec","dateReserved":"2026-03-09T18:20:23.399Z","datePublished":"2026-03-23T12:21:54.907Z","dateUpdated":"2026-03-26T10:47:04.841Z"},"containers":{"cna":{"providerMetadata":{"orgId":"309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c","shortName":"TuranSec","dateUpdated":"2026-03-26T10:47:04.841Z"},"title":"Lack of Rate Limiting Enables Brute-Force Attacks in Nexxt Nebula 300+","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-307","description":"CWE-307 Improper Restriction of Excessive Authentication Attempts","type":"CWE"}]}],"impacts":[{"descriptions":[{"lang":"en","value":"An attacker can perform unlimited authentication attempts, enabling brute-force attacks against administrative credentials."}]}],"affected":[{"vendor":"Nexxt Solutions","product":"Nebula 300+","versions":[{"status":"affected","version":"<= 12.01.01.37"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 does not implement rate limiting or account lockout mechanisms on authentication interfaces. An attacker can perform unlimited authentication attempts against endpoints that rely on credential validation, enabling brute-force attacks to guess administrative credentials without restriction.","supportingMedia":[{"type":"text/html","base64":false,"value":"Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 does not implement rate limiting or account lockout mechanisms on authentication interfaces. An attacker can perform unlimited authentication attempts against endpoints that rely on credential validation, enabling brute-force attacks to guess administrative credentials without restriction."}]}],"references":[{"url":"https://www.nexxtsolutions.com/connectivity/internal-products/ARN02304U6/"},{"url":"https://nexxt-connectivity-frontend.s3.amazonaws.com/media/docs/Nebula300+_v12.01.01.37.zip"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"ADJACENT","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","version":"4.0","baseSeverity":"HIGH","baseScore":7.7,"vectorString":"CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}}],"credits":[{"lang":"en","value":"Angel Barre (call4pwn)","type":"finder"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-23T15:16:32.320223Z","id":"CVE-2026-31851","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-23T15:51:38.714Z"}}]}}