CVE-2026-26340: CWE-306 Missing Authentication for Critical Function in Tattile s.r.l. Smart+
Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior expose RTSP streams without requiring authentication. A remote attacker can connect to the RTSP service and access live video/audio streams without valid credentials, resulting in unauthorized disclosure of surveillance data.
AI Analysis
Technical Summary
CVE-2026-26340 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Tattile s.r.l.'s Smart+, Vega, and Basic device families with firmware versions 1.181.5 and prior. The root cause is the lack of authentication enforcement on the Real Time Streaming Protocol (RTSP) service embedded in these devices. RTSP is commonly used for streaming live video and audio data from surveillance cameras. Due to this flaw, any remote attacker with network access to the device can connect to the RTSP service and retrieve live surveillance streams without providing any credentials. This bypasses intended access controls and exposes sensitive video and audio feeds. The vulnerability has a CVSS v4.0 base score of 8.7, reflecting its high impact and ease of exploitation. The attack vector is network-based with no required privileges or user interaction, and the scope is unchanged as the vulnerability affects only the confidentiality of the streams. No patches or mitigations have been officially released at the time of publication, and no exploits have been observed in the wild. The vulnerability affects critical surveillance infrastructure, potentially compromising privacy and security in environments relying on these devices for monitoring and control.
Potential Impact
The primary impact of CVE-2026-26340 is the unauthorized disclosure of sensitive surveillance video and audio streams, which compromises confidentiality. Organizations relying on Tattile Smart+, Vega, and Basic devices for security monitoring, traffic control, or industrial automation may face significant privacy violations, espionage, or operational security risks. Attackers could leverage the exposed streams to gather intelligence on physical security measures, monitor personnel movements, or conduct reconnaissance for further attacks. The lack of authentication means exploitation is trivial for any attacker with network access, including those on internal networks or connected via exposed services on the internet. This could lead to regulatory compliance issues, reputational damage, and potential legal liabilities for organizations handling sensitive or personal data. The availability and integrity of the devices are not directly affected, but the confidentiality breach alone is severe given the nature of the data involved.
Mitigation Recommendations
1. Immediately restrict network access to RTSP services on affected devices by implementing firewall rules or network segmentation to limit exposure to trusted management networks only. 2. Monitor network traffic for unauthorized RTSP connections and unusual streaming activity to detect potential exploitation attempts. 3. Disable RTSP streaming if not required or replace it with more secure streaming protocols that enforce authentication. 4. Engage with Tattile s.r.l. for firmware updates or patches addressing this vulnerability and apply them promptly once available. 5. Implement strong physical and network security controls around surveillance infrastructure to prevent unauthorized network access. 6. Consider deploying network intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous RTSP traffic patterns. 7. Conduct regular security audits of surveillance device configurations and access controls to ensure compliance with security policies. 8. Educate security teams about this vulnerability to ensure rapid response and mitigation in case of exploitation attempts.
Affected Countries
Italy, United States, Germany, France, United Kingdom, Canada, Netherlands, Spain, Belgium, Switzerland
CVE-2026-26340: CWE-306 Missing Authentication for Critical Function in Tattile s.r.l. Smart+
Description
Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior expose RTSP streams without requiring authentication. A remote attacker can connect to the RTSP service and access live video/audio streams without valid credentials, resulting in unauthorized disclosure of surveillance data.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-26340 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Tattile s.r.l.'s Smart+, Vega, and Basic device families with firmware versions 1.181.5 and prior. The root cause is the lack of authentication enforcement on the Real Time Streaming Protocol (RTSP) service embedded in these devices. RTSP is commonly used for streaming live video and audio data from surveillance cameras. Due to this flaw, any remote attacker with network access to the device can connect to the RTSP service and retrieve live surveillance streams without providing any credentials. This bypasses intended access controls and exposes sensitive video and audio feeds. The vulnerability has a CVSS v4.0 base score of 8.7, reflecting its high impact and ease of exploitation. The attack vector is network-based with no required privileges or user interaction, and the scope is unchanged as the vulnerability affects only the confidentiality of the streams. No patches or mitigations have been officially released at the time of publication, and no exploits have been observed in the wild. The vulnerability affects critical surveillance infrastructure, potentially compromising privacy and security in environments relying on these devices for monitoring and control.
Potential Impact
The primary impact of CVE-2026-26340 is the unauthorized disclosure of sensitive surveillance video and audio streams, which compromises confidentiality. Organizations relying on Tattile Smart+, Vega, and Basic devices for security monitoring, traffic control, or industrial automation may face significant privacy violations, espionage, or operational security risks. Attackers could leverage the exposed streams to gather intelligence on physical security measures, monitor personnel movements, or conduct reconnaissance for further attacks. The lack of authentication means exploitation is trivial for any attacker with network access, including those on internal networks or connected via exposed services on the internet. This could lead to regulatory compliance issues, reputational damage, and potential legal liabilities for organizations handling sensitive or personal data. The availability and integrity of the devices are not directly affected, but the confidentiality breach alone is severe given the nature of the data involved.
Mitigation Recommendations
1. Immediately restrict network access to RTSP services on affected devices by implementing firewall rules or network segmentation to limit exposure to trusted management networks only. 2. Monitor network traffic for unauthorized RTSP connections and unusual streaming activity to detect potential exploitation attempts. 3. Disable RTSP streaming if not required or replace it with more secure streaming protocols that enforce authentication. 4. Engage with Tattile s.r.l. for firmware updates or patches addressing this vulnerability and apply them promptly once available. 5. Implement strong physical and network security controls around surveillance infrastructure to prevent unauthorized network access. 6. Consider deploying network intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous RTSP traffic patterns. 7. Conduct regular security audits of surveillance device configurations and access controls to ensure compliance with security policies. 8. Educate security teams about this vulnerability to ensure rapid response and mitigation in case of exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-02-13T17:28:43.053Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699df93ebe58cf853b1d7e8e
Added to database: 2/24/2026, 7:17:18 PM
Last enriched: 3/11/2026, 8:02:55 PM
Last updated: 4/10/2026, 7:51:31 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.