{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-28806","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-03-11T14:36:05.863739Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-11T14:36:23.357Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"cpes":["cpe:2.3:a:nerves-hub:nerves_hub_web:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","packageName":"nerves_hub","packageURL":"pkg:otp/nerves_hub?repository_url=https:%2F%2Fgithub.com%2Fnerves-hub%2Fnerves_hub_web&vcs_url=git%20https:%2F%2Fgithub.com%2Fnerves-hub%2Fnerves_hub_web.git","product":"nerves_hub_web","repo":"https://github.com/nerves-hub/nerves_hub_web","vendor":"nerves-hub","versions":[{"lessThan":"2.4.0","status":"affected","version":"1.0.0","versionType":"semver"}]},{"collectionURL":"https://ghcr.io","cpes":["cpe:2.3:a:nerves-hub:nerves_hub_web:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","packageName":"nerves-hub/nerves-hub","packageURL":"pkg:oci/nerves-hub?repository_url=ghcr.io/nerves-hub","product":"nerves_hub_web","vendor":"nerves-hub","versions":[{"lessThan":"2.4.0","status":"affected","version":"1.0.0","versionType":"semver"}]},{"collectionURL":"https://github.com","cpes":["cpe:2.3:a:nerves-hub:nerves_hub_web:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","packageName":"nerves-hub/nerves_hub_web","packageURL":"pkg:github/nerves-hub/nerves_hub_web","product":"nerves_hub_web","repo":"https://github.com/nerves-hub/nerves_hub_web.git","vendor":"nerves-hub","versions":[{"lessThan":"1f69c9d595684a4650c3ac702f3dc7c5bcd7526c","status":"affected","version":"adaeefdb7a835525482588f43332ef988cc448c7","versionType":"git"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:nerves-hub:nerves_hub_web:*:*:*:*:*:*:*:*","versionEndExcluding":"2.4.0","versionStartIncluding":"1.0.0","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"AND"}],"credits":[{"lang":"en","type":"finder","value":"Josh Kalderimis / NervesHub team & NervesCloud"},{"lang":"en","type":"coordinator","value":"Jonatan Männchen / EEF"},{"lang":"en","type":"remediation reviewer","value":"Lars Wikman / NervesHub team & NervesCloud"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Improper Authorization vulnerability in nerves-hub nerves_hub_web allows cross-organization device control via device bulk actions and device update API.<p>Missing authorization checks in the device bulk actions and device update API endpoints allow authenticated users to target devices belonging to other organizations and perform actions outside of their privilege level.</p><p>An attacker can select devices outside of their organization by manipulating device identifiers and perform management actions on them, such as moving them to products they control. This may allow attackers to interfere with firmware updates, access device functionality exposed by the platform, or disrupt device connectivity.</p><p>In environments where additional features such as remote console access are enabled, this could lead to full compromise of affected devices.</p><p>This issue affects nerves_hub_web: from 1.0.0 before 2.4.0.</p>"}],"value":"Improper Authorization vulnerability in nerves-hub nerves_hub_web allows cross-organization device control via device bulk actions and device update API.\n\nMissing authorization checks in the device bulk actions and device update API endpoints allow authenticated users to target devices belonging to other organizations and perform actions outside of their privilege level.\n\nAn attacker can select devices outside of their organization by manipulating device identifiers and perform management actions on them, such as moving them to products they control. This may allow attackers to interfere with firmware updates, access device functionality exposed by the platform, or disrupt device connectivity.\n\nIn environments where additional features such as remote console access are enabled, this could lead to full compromise of affected devices.\n\nThis issue affects nerves_hub_web: from 1.0.0 before 2.4.0."}],"impacts":[{"capecId":"CAPEC-1","descriptions":[{"lang":"en","value":"CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.4,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-285","description":"CWE-285 Improper Authorization","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-668","description":"CWE-668 Exposure of Resource to Wrong Sphere","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-06T16:44:12.196Z","orgId":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","shortName":"EEF"},"references":[{"tags":["vendor-advisory","related"],"url":"https://github.com/nerves-hub/nerves_hub_web/security/advisories/GHSA-f8fr-mccc-xvcx"},{"tags":["related"],"url":"https://cna.erlef.org/cves/CVE-2026-28806.html"},{"tags":["related"],"url":"https://osv.dev/vulnerability/EEF-CVE-2026-28806"},{"tags":["patch"],"url":"https://github.com/nerves-hub/nerves_hub_web/commit/1f69c9d595684a4650c3ac702f3dc7c5bcd7526c"}],"source":{"discovery":"INTERNAL"},"title":"Improper authorization in device bulk actions and device update API allows cross-organization device control","x_generator":{"engine":"Vulnogram 0.2.0"}}},"cveMetadata":{"assignerOrgId":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","assignerShortName":"EEF","cveId":"CVE-2026-28806","datePublished":"2026-03-10T21:30:58.581Z","dateReserved":"2026-03-03T14:40:00.589Z","dateUpdated":"2026-04-06T16:44:12.196Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"}