CVE-2026-28806
Improper authorization in device bulk actions and device update API allows cross-organization device control
Vulnerability description
Improper Authorization vulnerability in nerves-hub nerves_hub_web allows cross-organization device control via device bulk actions and device update API.Missing authorization checks in the device bulk actions and device update API endpoints allow authenticated users to target devices belonging to other organizations and perform actions outside of their privilege level.
An attacker can select devices outside of their organization by manipulating device identifiers and perform management actions on them, such as moving them to products they control. This may allow attackers to interfere with firmware updates, access device functionality exposed by the platform, or disrupt device connectivity.
In environments where additional features such as remote console access are enabled, this could lead to full compromise of affected devices.
This issue affects nerves_hub_web: from 1.0.0 before 2.4.0.
Affected
pkg:otp/nerves_hub
| Status | Type | Version | Changes / Fixed in |
|---|---|---|---|
| affected | semver ⓘ | 1.0.0
|
< 2.4.0
|
pkg:oci/nerves-hub
| Status | Type | Version | Changes / Fixed in |
|---|---|---|---|
| affected | semver ⓘ | 1.0.0
|
< 2.4.0
|
pkg:github/nerves-hub/nerves_hub_web
| Status | Type | Version | Changes / Fixed in |
|---|---|---|---|
| affected | git ⓘ | adaeefdb7a83
|
< 1f69c9d59568
|
References
- https://github.com/nerves-hub/nerves_hub_web/security/advisories/GHSA-f8fr-mccc-xvcx vendor-advisory related
- https://cna.erlef.org/cves/CVE-2026-28806.html related
- https://osv.dev/vulnerability/EEF-CVE-2026-28806 related
- https://github.com/nerves-hub/nerves_hub_web/commit/1f69c9d595684a4650c3ac702f3dc7c5bcd7526c patch
Credits
- Finder: Josh Kalderimis / NervesHub team & NervesCloud
- Coordinator: Jonatan Männchen / EEF
- Remediation reviewer: Lars Wikman / NervesHub team & NervesCloud
CVE record as JSON:
GET /cves/CVE-2026-28806.json
OSV record as JSON:
GET /osv/EEF-CVE-2026-28806.json