An attacker could use data obtained by sniffing the network traffic to
forge packets in order to make arbitrary requests to Contemporary
Controls BASC 20T.
Metrics
Affected Vendors & Products
References
History
Fri, 10 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Contemporary Controls
Contemporary Controls bascontrol20 |
|
| Vendors & Products |
Contemporary Controls
Contemporary Controls bascontrol20 |
Thu, 09 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker could use data obtained by sniffing the network traffic to forge packets in order to make arbitrary requests to Contemporary Controls BASC 20T. | |
| Title | Contemporary Controls BASC 20T Reliance on Untrusted Inputs in a Security Decision | |
| Weaknesses | CWE-807 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-04-10T14:11:21.320Z
Reserved: 2025-12-02T21:00:14.794Z
Link: CVE-2025-13926
Updated: 2026-04-10T14:11:07.695Z
Status : Received
Published: 2026-04-09T20:16:23.807
Modified: 2026-04-10T15:16:22.513
Link: CVE-2025-13926
No data.