Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior implement an authentication token (X-User-Token) with insufficient expiration. An attacker who obtains a valid token (for example via interception, log exposure, or token reuse on a shared system) can continue to authenticate to the management interface until the token is revoked, enabling unauthorized access to device functions and data.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior implement an authentication token (X-User-Token) with insufficient expiration. An attacker who obtains a valid token (for example via interception, log exposure, or token reuse on a shared system) can continue to authenticate to the management interface until the token is revoked, enabling unauthorized access to device functions and data. | |
| Title | Tattile Smart+ / Vega / Basic <= 1.181.5 Insufficient Session Token Expiration | |
| Weaknesses | CWE-613 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-02-24T18:41:09.935Z
Updated: 2026-02-24T18:41:09.935Z
Reserved: 2026-02-13T17:28:43.054Z
Link: CVE-2026-26342
No data.
Status : Awaiting Analysis
Published: 2026-02-24T20:27:48.310
Modified: 2026-02-24T21:52:01.367
Link: CVE-2026-26342
No data.