CVE-2026-26340: CWE-306 Missing Authentication for Critical Function in Tattile s.r.l. Smart+
Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior expose RTSP streams without requiring authentication. A remote attacker can connect to the RTSP service and access live video/audio streams without valid credentials, resulting in unauthorized disclosure of surveillance data.
AI Analysis
Technical Summary
CVE-2026-26340 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Tattile s.r.l.'s Smart+, Vega, and Basic device families running firmware versions 1.181.5 and prior. The issue arises because the RTSP (Real Time Streaming Protocol) service on these devices does not enforce authentication, allowing any remote attacker to connect directly to the RTSP stream endpoint. This unauthorized access exposes live video and audio feeds captured by the surveillance devices, compromising confidentiality of sensitive surveillance data. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no authentication or user interaction required, and high confidentiality impact with no impact on integrity or availability. No patches or vendor advisories are currently available, and no active exploitation has been reported. The affected devices are commonly deployed in traffic monitoring, industrial, and security surveillance applications, increasing the potential sensitivity of the exposed data. This vulnerability highlights a critical design flaw in the device firmware where critical streaming functions are exposed without access controls.
Potential Impact
The primary impact of CVE-2026-26340 is the unauthorized disclosure of live surveillance video and audio streams, which can severely compromise privacy and operational security. Organizations relying on Tattile Smart+, Vega, and Basic devices for traffic monitoring, industrial automation, or security surveillance may have sensitive visual and audio data exposed to unauthorized parties. This can lead to intelligence gathering by malicious actors, industrial espionage, or privacy violations affecting individuals captured by the cameras. The lack of authentication means attackers can easily access streams without needing credentials or exploiting complex vulnerabilities, increasing the risk of widespread unauthorized access. Although the vulnerability does not affect data integrity or device availability, the confidentiality breach alone can have significant legal, regulatory, and reputational consequences for affected organizations. The absence of patches means the risk persists until mitigations are applied. Given the use of these devices in critical infrastructure and public safety contexts, the impact can extend to national security concerns in some regions.
Mitigation Recommendations
Until official patches or firmware updates are released by Tattile s.r.l., organizations should implement network-level mitigations to reduce exposure. These include restricting RTSP service access via firewall rules to trusted IP addresses only, ideally isolating affected devices on segmented networks with strict access controls. Deploy network intrusion detection systems (NIDS) to monitor for unusual RTSP connection attempts. Disable RTSP streaming if not required or replace devices with alternatives that enforce authentication. If RTSP streams must be used, consider deploying VPNs or secure tunnels to restrict access to authorized users. Regularly audit device firmware versions and monitor vendor communications for updates. Additionally, organizations should review physical security and privacy policies to mitigate risks from potential data leaks. Once vendor patches become available, prioritize immediate firmware upgrades to enforce authentication on RTSP streams.
Affected Countries
Italy, United States, Germany, France, United Kingdom, Canada, Netherlands, Spain, Belgium, Switzerland
CVE-2026-26340: CWE-306 Missing Authentication for Critical Function in Tattile s.r.l. Smart+
Description
Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior expose RTSP streams without requiring authentication. A remote attacker can connect to the RTSP service and access live video/audio streams without valid credentials, resulting in unauthorized disclosure of surveillance data.
AI-Powered Analysis
Technical Analysis
CVE-2026-26340 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Tattile s.r.l.'s Smart+, Vega, and Basic device families running firmware versions 1.181.5 and prior. The issue arises because the RTSP (Real Time Streaming Protocol) service on these devices does not enforce authentication, allowing any remote attacker to connect directly to the RTSP stream endpoint. This unauthorized access exposes live video and audio feeds captured by the surveillance devices, compromising confidentiality of sensitive surveillance data. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no authentication or user interaction required, and high confidentiality impact with no impact on integrity or availability. No patches or vendor advisories are currently available, and no active exploitation has been reported. The affected devices are commonly deployed in traffic monitoring, industrial, and security surveillance applications, increasing the potential sensitivity of the exposed data. This vulnerability highlights a critical design flaw in the device firmware where critical streaming functions are exposed without access controls.
Potential Impact
The primary impact of CVE-2026-26340 is the unauthorized disclosure of live surveillance video and audio streams, which can severely compromise privacy and operational security. Organizations relying on Tattile Smart+, Vega, and Basic devices for traffic monitoring, industrial automation, or security surveillance may have sensitive visual and audio data exposed to unauthorized parties. This can lead to intelligence gathering by malicious actors, industrial espionage, or privacy violations affecting individuals captured by the cameras. The lack of authentication means attackers can easily access streams without needing credentials or exploiting complex vulnerabilities, increasing the risk of widespread unauthorized access. Although the vulnerability does not affect data integrity or device availability, the confidentiality breach alone can have significant legal, regulatory, and reputational consequences for affected organizations. The absence of patches means the risk persists until mitigations are applied. Given the use of these devices in critical infrastructure and public safety contexts, the impact can extend to national security concerns in some regions.
Mitigation Recommendations
Until official patches or firmware updates are released by Tattile s.r.l., organizations should implement network-level mitigations to reduce exposure. These include restricting RTSP service access via firewall rules to trusted IP addresses only, ideally isolating affected devices on segmented networks with strict access controls. Deploy network intrusion detection systems (NIDS) to monitor for unusual RTSP connection attempts. Disable RTSP streaming if not required or replace devices with alternatives that enforce authentication. If RTSP streams must be used, consider deploying VPNs or secure tunnels to restrict access to authorized users. Regularly audit device firmware versions and monitor vendor communications for updates. Additionally, organizations should review physical security and privacy policies to mitigate risks from potential data leaks. Once vendor patches become available, prioritize immediate firmware upgrades to enforce authentication on RTSP streams.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-02-13T17:28:43.053Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699df93ebe58cf853b1d7e8e
Added to database: 2/24/2026, 7:17:18 PM
Last enriched: 2/24/2026, 7:32:05 PM
Last updated: 2/24/2026, 9:31:11 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27195: CWE-755: Improper Handling of Exceptional Conditions in bytecodealliance wasmtime
MediumCVE-2026-25899: CWE-789: Memory Allocation with Excessive Size Value in gofiber fiber
HighCVE-2026-25891: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in gofiber fiber
HighCVE-2026-25882: CWE-129: Improper Validation of Array Index in gofiber fiber
MediumCVE-2026-22553: CWE-78 in InSAT MasterSCADA BUK-TS
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.