CVE-2026-1495

medium

Description

The vulnerability, if exploited, could allow an attacker with Event Log Reader (S-1-5-32-573) privileges to obtain proxy details, including URL and proxy credentials, from the PI to CONNECT event log files. This could enable unauthorized access to the proxy server.

References

https://www.cisa.gov/news-events/ics-advisories/icsa-26-041-04

Details

Source: Mitre, NVD

Published: 2026-02-10

Updated: 2026-02-10

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 6.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Severity: Medium

CVSS v4

Base Score: 5.7

Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:L

Severity: Medium

EPSS

EPSS: 0.00015