← Back to CVEs
CVE-2026-26341
CRITICAL9.8
Description
Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior ship with default credentials that are not forced to be changed during installation or commissioning. An attacker who can reach the management interface can authenticate using the default credentials and gain administrative access, enabling unauthorized access to device configuration and data.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published2/24/2026
Last Modified2/26/2026
Sourcenvd
Honeypot Sightings0
Affected Products
tattile:anpr_mobiletattile:anpr_mobile_firmwaretattile:axle_countertattile:axle_counter_firmwaretattile:basic_mk2tattile:basic_mk2_firmwaretattile:smart\+tattile:smart\+_firmwaretattile:smart\+_speedtattile:smart\+_speed_firmwaretattile:smart\+_traffic_lighttattile:smart\+_traffic_light_firmwaretattile:tolling\+tattile:tolling\+_firmwaretattile:vega11tattile:vega11_firmwaretattile:vega33tattile:vega33_firmwaretattile:vega53tattile:vega53_firmware
Weaknesses (CWE)
CWE-1392
References
https://www.tattile.com/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/tattile-smart-vega-basic-default-credentials(disclosure@vulncheck.com)
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5977.php(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.