Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.7
Tattile Smart+, Vega, and Basic devices: Stolen access token allows unauthorized access
CVE-2026-26342
Summary
Some older Tattile devices have a security issue with their access token, which can be stolen by an attacker. This allows them to control the device and access its data until the token is manually revoked. To protect your device, update to the latest firmware version.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| tattile | smart\+_firmware | <= 1.181.5 | – |
| tattile | tolling\+_firmware | <= 1.181.5 | – |
| tattile | smart\+_speed_firmware | <= 1.181.5 | – |
| tattile | smart\+_traffic_light_firmware | <= 1.181.5 | – |
| tattile | axle_counter_firmware | <= 1.181.5 | – |
| tattile | vega53_firmware | <= 1.181.5 | – |
| tattile | vega33_firmware | <= 1.181.5 | – |
| tattile | vega11_firmware | <= 1.181.5 | – |
| tattile | basic_mk2_firmware | <= 1.181.5 | – |
| tattile | anpr_mobile_firmware | <= 1.181.5 | – |
Original title
Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior implement an authentication token (X-User-Token) with insufficient expiration. An attacker who obtains a valid to...
Original description
Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior implement an authentication token (X-User-Token) with insufficient expiration. An attacker who obtains a valid token (for example via interception, log exposure, or token reuse on a shared system) can continue to authenticate to the management interface until the token is revoked, enabling unauthorized access to device functions and data.
nvd CVSS3.1
9.8
nvd CVSS4.0
8.7
Vulnerability type
CWE-613
- https://www.tattile.com/ Product
- https://www.vulncheck.com/advisories/tattile-smart-vega-basic-insufficient-sessi... VDB Entry Vendor Advisory
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5976.php Vendor Advisory Exploit
Published: 24 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026