The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-35061

CVE-2026-35061: Anviz CX7 Information Disclosure Flaw

CVE-2026-35061 is an information disclosure vulnerability in Anviz CX7 Firmware allowing unauthenticated access to test photos, exposing sensitive operational imagery. This article covers technical details, impact, and mitigation.

Published: April 23, 2026

CVE-2026-35061 Overview

CVE-2026-35061 is a missing authorization vulnerability (CWE-862) affecting Anviz CX7 firmware. The vulnerability allows the most recently captured test photo to be retrieved without authentication, potentially revealing sensitive operational imagery. This type of information disclosure can expose physical security configurations, personnel information, and environmental details that could be leveraged in targeted attacks against facilities using the affected access control devices.

Critical Impact

Unauthenticated remote attackers can retrieve test photos from Anviz CX7 devices, potentially exposing sensitive facility imagery and compromising physical security posture.

Affected Products

  • Anviz CX7 Firmware (all versions prior to patched release)
  • Anviz CX7 Access Control Devices

Discovery Timeline

  • 2026-04-17 - CVE-2026-35061 published to NVD
  • 2026-04-20 - Last updated in NVD database

Technical Details for CVE-2026-35061

Vulnerability Analysis

This vulnerability stems from a fundamental missing authorization control within the Anviz CX7 firmware's image retrieval functionality. The device captures test photos as part of its normal operation—typically used for verifying camera positioning, lighting conditions, or facial recognition calibration. However, the endpoint or mechanism that stores and serves these test images lacks proper authentication checks, allowing any network-accessible attacker to retrieve the most recently captured photo.

The network-based attack vector requires no user interaction and no privileges, making exploitation straightforward for any attacker with network access to the device. The impact is limited to confidentiality exposure of the captured imagery with no direct effect on system integrity or availability.

Root Cause

The root cause is CWE-862: Missing Authorization. The Anviz CX7 firmware fails to implement proper access control checks before serving test photo content. This architectural flaw allows unauthenticated requests to retrieve sensitive imagery that should only be accessible to authorized administrators.

Attack Vector

The attack exploits the network-accessible interface of the Anviz CX7 device. An attacker positioned on the same network segment—or with external network access if the device is improperly exposed—can send unauthenticated requests to retrieve the stored test photo. The attack requires no special privileges, no user interaction, and has low complexity.

The vulnerability allows remote retrieval of test photos without authentication. When the device captures a test image during normal operations such as calibration or configuration, that image becomes accessible to any network attacker who can reach the device's web interface or API endpoint. For detailed technical information, refer to the CISA ICS Advisory ICSA-26-106-03.

Detection Methods for CVE-2026-35061

Indicators of Compromise

  • Unexpected HTTP/HTTPS requests to the CX7 device's image retrieval endpoints from unauthorized IP addresses
  • Repeated access attempts to test photo resources from external or unfamiliar network addresses
  • Authentication bypass patterns in device access logs showing successful resource retrieval without corresponding login events
  • Network traffic analysis showing image data exfiltration from access control devices

Detection Strategies

  • Monitor network traffic for unauthenticated requests to Anviz CX7 devices, particularly requests targeting image or photo-related endpoints
  • Implement network-based intrusion detection rules to alert on access patterns consistent with unauthorized image retrieval
  • Review device access logs for anomalous request patterns that don't correlate with legitimate administrative activity
  • Deploy honeypot configurations to detect reconnaissance or exploitation attempts against IoT and access control infrastructure

Monitoring Recommendations

  • Enable comprehensive logging on all Anviz CX7 devices and forward logs to a centralized SIEM for correlation
  • Establish network segmentation monitoring to detect any unauthorized cross-segment access to physical security infrastructure
  • Implement alerting for any access to CX7 devices from IP addresses outside the authorized management network range
  • Conduct periodic security assessments of IoT and physical access control device configurations

How to Mitigate CVE-2026-35061

Immediate Actions Required

  • Isolate affected Anviz CX7 devices to a dedicated, segmented network accessible only by authorized management systems
  • Implement network access controls (firewall rules, ACLs) to restrict access to CX7 devices to only authorized administrator IP addresses
  • Contact Anviz support through their contact page to inquire about firmware updates addressing this vulnerability
  • Audit recent access logs on affected devices to identify any potential unauthorized access or data exfiltration

Patch Information

Organizations should monitor the CISA ICS Advisory ICSA-26-106-03 and the GitHub CSAF file for updates regarding official patches from Anviz. Contact Anviz directly through their official contact page to obtain the latest firmware version that addresses this authentication bypass vulnerability.

Workarounds

  • Place all Anviz CX7 devices behind a firewall with strict access control lists limiting connectivity to authorized management workstations only
  • Disable or avoid using the test photo functionality until a firmware patch is available
  • Implement a VPN requirement for any remote administrative access to physical security infrastructure
  • Consider implementing a reverse proxy with authentication in front of the device's web interface as an additional access control layer
bash
# Example network isolation configuration (iptables)
# Restrict access to Anviz CX7 device (192.168.10.50) to only authorized admin workstation (192.168.1.100)
iptables -A FORWARD -s 192.168.1.100 -d 192.168.10.50 -j ACCEPT
iptables -A FORWARD -d 192.168.10.50 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechAnviz

  • SeverityMEDIUM

  • CVSS Score5.3

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-862
  • Technical References
  • GitHub CSAF File

  • Anviz Contact Information

  • CISA ICS Advisory ICSA-26-106-03
  • Related CVEs
  • CVE-2026-33093: Anviz CX7 Information Disclosure Flaw

  • CVE-2026-32650: Anviz CrossChex Information Disclosure

  • CVE-2026-32648: Anviz CX2 Lite/CX7 Info Disclosure Flaw

  • CVE-2026-33569: Anviz CX2 Lite/CX7 Info Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English