Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

vegapuls_6x

Source -

NVD

CNA CVEs -

0

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

1
Related CVEsRelated VendorsRelated AssignersReports
1Vulnerabilities found

CVE-2026-3323
Assigner-CERT@VDE
ShareView Details
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.02% / 4.26%
||
7 Day CHG~0.00%
Published-28 Apr, 2026 | 10:24
Updated-11 May, 2026 | 14:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
VEGA: Privilege escalation through unsecured configuration interface in VEGAPULS devices

An unsecured configuration interface on affected devices allows unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes.

Action-Not Available
Vendor-vegaVEGA Grieshaber
Product-vegapuls_6x_firmwarevegapuls_6xVEGAPULS 6X Two-wire PROFINET, Modbus TCP, OPC UA (Ethernet-APL)
CWE ID-CWE-306
Missing Authentication for Critical Function