Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2756: Missing Authentication in OmniPEMF NeoRhythm

0
Low
VulnerabilityCVE-2026-2756cvecve-2026-2756
Published: Sat Mar 21 2026 (03/21/2026, 17:32:08 UTC)
Source: CVE Database V5
Vendor/Project: OmniPEMF
Product: NeoRhythm

Description

CVE-2026-2756 is a low-severity vulnerability in OmniPEMF NeoRhythm (up to version 20260308) involving missing authentication in a BLE interface component. The flaw allows an attacker on the local network to exploit this missing authentication, but the attack is complex and difficult to execute. No user interaction or privileges are required, but the attacker must be within the local network. The vendor has not responded to disclosure attempts, and no patches or known exploits currently exist. The vulnerability impacts confidentiality, integrity, and availability at a low level due to limited exploitability and scope. Organizations using NeoRhythm devices should be aware of this risk and monitor for updates or mitigations. This threat primarily affects regions where these devices are deployed, likely including the United States, Canada, Germany, Japan, and South Korea. Defenders should focus on network segmentation, BLE interface monitoring, and restricting local network access to mitigate risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/21/2026, 18:00:55 UTC

Technical Analysis

CVE-2026-2756 identifies a security vulnerability in the OmniPEMF NeoRhythm product, specifically affecting an unspecified function within its Bluetooth Low Energy (BLE) interface component. The vulnerability results in missing authentication, meaning that an attacker within the local network can interact with the BLE interface without proper verification. This could allow unauthorized access or manipulation of the device's BLE communications. The attack vector is limited to local network access, requiring the attacker to be physically or logically close to the target device. The complexity of the attack is high, and exploitability is difficult, indicating that specialized knowledge and conditions are necessary to successfully exploit the flaw. No user interaction or privileges are required, but the scope of impact is limited to the BLE interface and the device itself. The vendor OmniPEMF has not responded to disclosure attempts, and no patches or mitigations have been released as of the publication date. The vulnerability has a CVSS 4.0 base score of 2.3, reflecting low severity due to limited impact and exploitability. The lack of authentication in the BLE interface could potentially allow attackers to intercept or manipulate BLE communications, possibly affecting device confidentiality, integrity, and availability at a low level. However, the absence of known exploits in the wild reduces immediate risk. Organizations using NeoRhythm devices should be vigilant and consider network-level protections to mitigate potential exploitation.

Potential Impact

The impact of CVE-2026-2756 is primarily limited to organizations and individuals using OmniPEMF NeoRhythm devices within local network environments. Successful exploitation could lead to unauthorized access to the BLE interface, potentially allowing attackers to intercept or manipulate device communications. This could compromise the confidentiality and integrity of data transmitted via BLE and may disrupt device functionality, impacting availability. However, the high complexity and difficult exploitability reduce the likelihood of widespread attacks. Since the attack requires local network access, remote attackers are unlikely to exploit this vulnerability without prior network compromise. The absence of vendor response and patches means that affected organizations must rely on compensating controls. The overall risk is low, but sensitive environments using these devices should consider the potential for targeted attacks, especially in healthcare or wellness sectors where NeoRhythm devices may be deployed.

Mitigation Recommendations

1. Implement strict network segmentation to isolate NeoRhythm devices from general user networks, limiting local network access only to trusted personnel and systems. 2. Monitor Bluetooth Low Energy traffic for unusual or unauthorized connection attempts, using BLE-specific intrusion detection tools where available. 3. Restrict physical and logical access to the local network to prevent unauthorized attackers from gaining proximity required to exploit the vulnerability. 4. Employ device-level security controls such as disabling BLE interfaces when not in use or using secure BLE pairing methods if configurable. 5. Maintain an inventory of all NeoRhythm devices and track firmware versions to identify affected units. 6. Engage with OmniPEMF for updates or patches, and subscribe to vulnerability advisories for future developments. 7. Consider deploying network access control (NAC) solutions to enforce device authentication and limit network exposure. 8. Educate staff about the risks of local network attacks and the importance of physical security around BLE-enabled devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-19T15:01:39.688Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bed94ff4197a8e3be73e58

Added to database: 3/21/2026, 5:45:51 PM

Last enriched: 3/21/2026, 6:00:55 PM

Last updated: 3/21/2026, 10:53:47 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses