{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T12:23:46.931","vulnerabilities":[{"cve":{"id":"CVE-2025-26408","sourceIdentifier":"551230f0-3615-47bd-b7cc-93e92e730bbf","published":"2025-02-11T10:15:09.617","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The JTAG interface of Wattsense Bridge devices can be accessed with physical access to the PCB. After connecting to the interface, full access to the device is possible. This enables an attacker to extract information, modify and debug the device's firmware. All known versions are affected."},{"lang":"es","value":"Se puede acceder a la interfaz JTAG de los dispositivos Wattsense Bridge mediante acceso físico a la PCB. Después de conectarse a la interfaz, es posible acceder por completo al dispositivo. Esto permite a un atacante extraer información, modificar y depurar el firmware del dispositivo. Todas las versiones conocidas se ven afectadas."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":5.2}]},"weaknesses":[{"source":"551230f0-3615-47bd-b7cc-93e92e730bbf","type":"Secondary","description":[{"lang":"en","value":"CWE-1191"}]}],"references":[{"url":"https://r.sec-consult.com/wattsense","source":"551230f0-3615-47bd-b7cc-93e92e730bbf"},{"url":"https://support.wattsense.com/hc/en-150/articles/13366066529437-Release-Notes","source":"551230f0-3615-47bd-b7cc-93e92e730bbf"},{"url":"http://seclists.org/fulldisclosure/2025/Feb/9","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}