Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior ship with default credentials that are not forced to be changed during installation or commissioning. An attacker who can reach the management interface can authenticate using the default credentials and gain administrative access, enabling unauthorized access to device configuration and data.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior ship with default credentials that are not forced to be changed during installation or commissioning. An attacker who can reach the management interface can authenticate using the default credentials and gain administrative access, enabling unauthorized access to device configuration and data. | |
| Title | Tattile Smart+ / Vega / Basic <= 1.181.5 Default Credentials | |
| Weaknesses | CWE-1392 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-02-24T18:40:54.212Z
Updated: 2026-02-24T21:33:18.810Z
Reserved: 2026-02-13T17:28:43.054Z
Link: CVE-2026-26341
Updated: 2026-02-24T21:33:12.476Z
Status : Awaiting Analysis
Published: 2026-02-24T20:27:48.103
Modified: 2026-02-24T21:52:01.367
Link: CVE-2026-26341
No data.