SenseLive X3050

Plan PatchCVSS 9.8ICS-CERT ICSA-26-111-12Apr 21, 2026
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

The SenseLive X3050 device contains multiple authentication and encryption vulnerabilities (CWE-288, CWE-613, CWE-798, CWE-522, CWE-306, CWE-319, CWE-862, CWE-352) that could allow remote attackers to gain unauthorized access and take complete control of the device. The vulnerabilities affect version V1.523. SenseLive did not coordinate with CISA on remediation, and no patch has been released.

What this means
What could happen
An attacker who gains access to the X3050 device could take complete control of it, potentially altering sensor readings, disrupting data collection, or manipulating system operations. This could compromise the integrity of any process or safety system that relies on the device for monitoring or control.
Who's at risk
Any water authority, utility, or industrial facility using the SenseLive X3050 sensor or monitoring device should review this advisory. The X3050 is used for remote sensing and data acquisition; if deployed in critical process loops or safety monitoring, compromise could affect operational visibility and control.
How it could be exploited
An attacker could exploit one or more authentication or encryption weaknesses (CWE-288, CWE-613, CWE-798, CWE-522, CWE-306, CWE-319, CWE-352) to gain unauthorized access to the device from the network. Once access is obtained, the attacker could execute arbitrary commands or configuration changes due to insufficient access controls (CWE-862), resulting in complete device compromise.
Prerequisites
  • Network access to the X3050 device
  • Ability to reach the device's management or communication interface from an attacker's network position
remotely exploitableno authentication requiredlow complexityno patch availablecritical severitymultiple CWE classes indicating fundamental security design issues
Exploitability
Unlikely to be exploited — EPSS score 0.1%
Affected products (1)
ProductAffected VersionsFix Status
X3050: V1.523V1.523No fix yet
Remediation & Mitigation
0/4
Do now
0/3
HOTFIXContact SenseLive directly via https://senselive.io/contact to request security updates, patches, or mitigations for the X3050
WORKAROUNDRestrict network access to the X3050 device by implementing firewall rules to allow only trusted engineering workstations and control systems to communicate with it
HARDENINGIsolate the X3050 device on a dedicated industrial network segment separated from corporate IT networks and untrusted external connections
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HARDENINGMonitor the X3050 device for signs of unauthorized access or configuration changes, and log all access attempts to the device
API: /api/v1/advisories/2c455c82-b3bb-42c9-bb2d-6d8920b39ebc

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.