Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28806: CWE-285 Improper Authorization in nerves-hub nerves_hub_web

0
Critical
VulnerabilityCVE-2026-28806cvecve-2026-28806cwe-285cwe-668
Published: Tue Mar 10 2026 (03/10/2026, 21:30:58 UTC)
Source: CVE Database V5
Vendor/Project: nerves-hub
Product: nerves_hub_web

Description

CVE-2026-28806 is a critical improper authorization vulnerability in nerves-hub's nerves_hub_web component affecting versions from 1. 0. 0 before 2. 4. 0. It allows authenticated users with limited privileges to manipulate device identifiers and perform unauthorized bulk device actions or updates on devices belonging to other organizations. This can lead to unauthorized device management, including moving devices to attacker-controlled products, interfering with firmware updates, and disrupting device connectivity. In environments with remote console access enabled, attackers may fully compromise affected devices. The vulnerability requires no user interaction and can be exploited remotely over the network with low attack complexity. The CVSS 4.

AI-Powered Analysis

AILast updated: 03/10/2026, 21:59:07 UTC

Technical Analysis

CVE-2026-28806 is an improper authorization vulnerability (CWE-285) found in the nerves_hub_web component of the nerves-hub project, affecting versions from 1.0.0 up to but not including 2.4.0. The vulnerability arises due to missing authorization checks in the device bulk actions and device update API endpoints. Authenticated users with legitimate access to the platform can manipulate device identifiers to target devices outside their own organization. This allows them to perform unauthorized management actions such as moving devices to products they control, interfering with firmware updates, or disrupting device connectivity. The vulnerability also relates to CWE-668, which concerns exposure of resource access control. If additional features like remote console access are enabled, attackers could gain full control over affected devices, leading to complete device compromise. The flaw is remotely exploitable without user interaction and requires only low privileges, making it highly dangerous. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required beyond authenticated user, no user interaction, and high impact on confidentiality, integrity, and availability. This vulnerability affects organizations using nerves_hub_web for device management, especially those managing IoT or embedded devices across multiple organizations or tenants.

Potential Impact

The impact of CVE-2026-28806 is significant for organizations relying on nerves_hub_web for managing fleets of devices, particularly in multi-tenant or multi-organization environments. Attackers can gain unauthorized control over devices belonging to other organizations, potentially disrupting critical device operations, interfering with firmware updates, or causing denial of service by disrupting connectivity. In scenarios where remote console access is enabled, attackers could fully compromise devices, leading to data theft, manipulation of device functionality, or use of devices as pivot points for further network intrusion. This undermines the confidentiality, integrity, and availability of managed devices and associated services. The vulnerability could impact industries deploying IoT devices at scale, such as manufacturing, smart infrastructure, healthcare, and logistics, where device integrity and availability are critical. The ability to move devices between products controlled by attackers could also facilitate supply chain attacks or persistent unauthorized access. Given the critical CVSS score and ease of exploitation, the threat poses a high risk to organizations worldwide using affected versions.

Mitigation Recommendations

To mitigate CVE-2026-28806, organizations should immediately upgrade nerves_hub_web to version 2.4.0 or later where the authorization checks have been properly implemented. Until patching is possible, restrict access to the device bulk actions and device update APIs to trusted users only, employing network segmentation and strict access controls. Implement monitoring and alerting for unusual device management activities, such as bulk device moves or updates initiated by unexpected accounts. Review and tighten role-based access control (RBAC) policies to ensure users have the minimum necessary privileges. Disable or restrict remote console access features unless absolutely required and ensure they are protected by strong authentication and authorization mechanisms. Conduct thorough audits of device inventories and configurations to detect unauthorized changes. Employ anomaly detection on device management operations to identify potential exploitation attempts. Finally, maintain an incident response plan tailored to device compromise scenarios to quickly contain and remediate any breaches resulting from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
EEF
Date Reserved
2026-03-03T14:40:00.589Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b090d12f860ef943c885b5

Added to database: 3/10/2026, 9:44:49 PM

Last enriched: 3/10/2026, 9:59:07 PM

Last updated: 3/10/2026, 10:46:04 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses