Anviz Multiple Products
Multiple critical vulnerabilities exist in Anviz CX7, CX2 Lite, and CrossChex Standard devices affecting access control, authentication, and secure communications. These vulnerabilities—including missing authentication checks (CWE-306), insecure credential storage (CWE-321), command injection (CWE-77), and insufficient input validation (CWE-23)—allow remote attackers to bypass security controls, execute arbitrary code with root privileges, decrypt sensitive data, capture credentials, and obtain full administrative control over affected devices. No vendor patches are currently available; Anviz has not responded to CISA coordination efforts.
- Network access to the device (unauthenticated)
- No valid credentials or administrative access required
- Device reachable from attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/adf566bf-dfb7-4676-a4e3-fcc744e01cb1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.