Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26341: CWE-1392 Use of Default Credentials in Tattile s.r.l. Smart+

0
Critical
VulnerabilityCVE-2026-26341cvecve-2026-26341cwe-1392
Published: Tue Feb 24 2026 (02/24/2026, 18:40:54 UTC)
Source: CVE Database V5
Vendor/Project: Tattile s.r.l.
Product: Smart+

Description

Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior ship with default credentials that are not forced to be changed during installation or commissioning. An attacker who can reach the management interface can authenticate using the default credentials and gain administrative access, enabling unauthorized access to device configuration and data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 20:03:06 UTC

Technical Analysis

CVE-2026-26341 is a vulnerability classified under CWE-1392 (Use of Default Credentials) affecting Tattile s.r.l.'s Smart+, Vega, and Basic device families running firmware version 1.181.5 and prior. These devices ship with factory default administrative credentials that are neither randomized nor forced to be changed during installation or commissioning. Consequently, any attacker who can reach the device's management interface over the network can authenticate using these default credentials without requiring any privileges or user interaction. This grants the attacker full administrative access to the device, enabling unauthorized changes to device configurations, potential disruption of device operations, and access to sensitive data stored or processed by the device. The vulnerability is network exploitable (AV:N), requires no authentication (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability at a high level (VC:H/VI:H/VA:H). The lack of forced credential updates during setup is a critical security oversight, increasing the attack surface significantly. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it highly exploitable in practice, especially in environments where these devices are accessible from untrusted networks or insufficiently segmented internal networks. The absence of a patch or forced mitigation in firmware versions up to 1.181.5 necessitates immediate compensating controls.

Potential Impact

The impact of this vulnerability is severe for organizations deploying Tattile Smart+, Vega, and Basic devices. Unauthorized administrative access can lead to full compromise of device configurations, enabling attackers to alter device behavior, disable security features, or disrupt critical functions. Confidential data managed or transmitted by these devices can be exposed or manipulated, risking data breaches and operational integrity. Since these devices are often used in industrial, traffic monitoring, or security contexts, exploitation could result in operational downtime, safety hazards, or loss of trust in monitoring systems. The ease of exploitation without authentication or user interaction means attackers can quickly gain control once network access is obtained. This risk is amplified in environments where management interfaces are exposed to broader networks or the internet without proper segmentation or access controls. The vulnerability could also serve as a foothold for lateral movement within enterprise networks, potentially leading to broader compromise.

Mitigation Recommendations

Organizations should immediately implement the following mitigations: 1) Change all default credentials on affected devices before deployment or as soon as possible if already deployed. 2) Restrict network access to the management interfaces by implementing network segmentation, firewall rules, and VPN access to limit exposure only to trusted administrators. 3) Monitor network traffic and device logs for unauthorized access attempts or suspicious activity related to these devices. 4) If possible, upgrade to firmware versions beyond 1.181.5 that address this issue or apply vendor-provided patches once available. 5) Employ multi-factor authentication (MFA) for device management interfaces if supported. 6) Conduct regular security audits and penetration tests focusing on device management interfaces. 7) Educate installation and commissioning personnel about the criticality of changing default credentials and enforce policies to ensure compliance. 8) Consider deploying intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts targeting these devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-13T17:28:43.054Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699df93ebe58cf853b1d7e93

Added to database: 2/24/2026, 7:17:18 PM

Last enriched: 3/11/2026, 8:03:06 PM

Last updated: 4/11/2026, 1:50:47 AM

Views: 204

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses