An attacker could use data obtained by sniffing the network traffic to forge packets in order to make arbitrary requests to Contemporary Controls BASC 20T.
History

Fri, 10 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Contemporary Controls
Contemporary Controls bascontrol20
Vendors & Products Contemporary Controls
Contemporary Controls bascontrol20

Thu, 09 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description An attacker could use data obtained by sniffing the network traffic to forge packets in order to make arbitrary requests to Contemporary Controls BASC 20T.
Title Contemporary Controls BASC 20T Reliance on Untrusted Inputs in a Security Decision
Weaknesses CWE-807
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-04-10T14:11:21.320Z

Reserved: 2025-12-02T21:00:14.794Z

Link: CVE-2025-13926

cve-icon Vulnrichment

Updated: 2026-04-10T14:11:07.695Z

cve-icon NVD

Status : Received

Published: 2026-04-09T20:16:23.807

Modified: 2026-04-10T15:16:22.513

Link: CVE-2025-13926

cve-icon Redhat

No data.