Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26340: CWE-306 Missing Authentication for Critical Function in Tattile s.r.l. Smart+

0
High
VulnerabilityCVE-2026-26340cvecve-2026-26340cwe-306
Published: Tue Feb 24 2026 (02/24/2026, 18:40:35 UTC)
Source: CVE Database V5
Vendor/Project: Tattile s.r.l.
Product: Smart+

Description

Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior expose RTSP streams without requiring authentication. A remote attacker can connect to the RTSP service and access live video/audio streams without valid credentials, resulting in unauthorized disclosure of surveillance data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 20:02:55 UTC

Technical Analysis

CVE-2026-26340 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Tattile s.r.l.'s Smart+, Vega, and Basic device families with firmware versions 1.181.5 and prior. The root cause is the lack of authentication enforcement on the Real Time Streaming Protocol (RTSP) service embedded in these devices. RTSP is commonly used for streaming live video and audio data from surveillance cameras. Due to this flaw, any remote attacker with network access to the device can connect to the RTSP service and retrieve live surveillance streams without providing any credentials. This bypasses intended access controls and exposes sensitive video and audio feeds. The vulnerability has a CVSS v4.0 base score of 8.7, reflecting its high impact and ease of exploitation. The attack vector is network-based with no required privileges or user interaction, and the scope is unchanged as the vulnerability affects only the confidentiality of the streams. No patches or mitigations have been officially released at the time of publication, and no exploits have been observed in the wild. The vulnerability affects critical surveillance infrastructure, potentially compromising privacy and security in environments relying on these devices for monitoring and control.

Potential Impact

The primary impact of CVE-2026-26340 is the unauthorized disclosure of sensitive surveillance video and audio streams, which compromises confidentiality. Organizations relying on Tattile Smart+, Vega, and Basic devices for security monitoring, traffic control, or industrial automation may face significant privacy violations, espionage, or operational security risks. Attackers could leverage the exposed streams to gather intelligence on physical security measures, monitor personnel movements, or conduct reconnaissance for further attacks. The lack of authentication means exploitation is trivial for any attacker with network access, including those on internal networks or connected via exposed services on the internet. This could lead to regulatory compliance issues, reputational damage, and potential legal liabilities for organizations handling sensitive or personal data. The availability and integrity of the devices are not directly affected, but the confidentiality breach alone is severe given the nature of the data involved.

Mitigation Recommendations

1. Immediately restrict network access to RTSP services on affected devices by implementing firewall rules or network segmentation to limit exposure to trusted management networks only. 2. Monitor network traffic for unauthorized RTSP connections and unusual streaming activity to detect potential exploitation attempts. 3. Disable RTSP streaming if not required or replace it with more secure streaming protocols that enforce authentication. 4. Engage with Tattile s.r.l. for firmware updates or patches addressing this vulnerability and apply them promptly once available. 5. Implement strong physical and network security controls around surveillance infrastructure to prevent unauthorized network access. 6. Consider deploying network intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous RTSP traffic patterns. 7. Conduct regular security audits of surveillance device configurations and access controls to ensure compliance with security policies. 8. Educate security teams about this vulnerability to ensure rapid response and mitigation in case of exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-13T17:28:43.053Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699df93ebe58cf853b1d7e8e

Added to database: 2/24/2026, 7:17:18 PM

Last enriched: 3/11/2026, 8:02:55 PM

Last updated: 4/10/2026, 7:51:31 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses